- Constellation (Kennett Square, PA)
- …upon the security technologies utilized by the CSOC. Perform system administration on specialized cyber defense applications and systems (eg, EDR, Cloud and ... backup and restoration. Build, install, configure, and test dedicated cyber defense hardware. + Provide Log &...5 to 8 years of solid, diverse experience in cyber security Systems operations, or equivalent combination… more
- Constellation (Kennett Square, PA)
- …benefits package that includes bonus and 401(k). **PRIMARY PURPOSE OF POSITION** The Senior Cyber Security Vulnerability Management Analyst will be expected to ... tests on web-based applications, networks, and other types of computer systems on a regular basis and determines/documents deviations from approved configuration… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Penn Medicine (Philadelphia, PA)
- …platforms, operating systems and network cybersecurity + Expert knowledge of cyber defense tools, including VM, SIEM, SOAR, EDR, UEBA, NDR, SWG, ... Are you living your life's work? **Summary:** + The Vulnerability Management Senior Analyst functions as a technical expert that provides support to vulnerability… more
- Lockheed Martin (Moorestown, NJ)
- …in ensuring the operational readiness and performance excellence of critical naval defense systems \. **The Work** The primary responsibility for the Site ... Contribute directly to enhancing the capabilities and readiness of Aegis Weapon Systems , crucial for national defense and security\. * Growth: Opportunity… more
- Penn Medicine (Philadelphia, PA)
- …platforms, operating systems and network cybersecurity + Expert knowledge of cyber defense tools, including SIEM, SOAR, EDR, UEBA, NDR, SWG, SEG, ... research and analysis of threat and vulnerabilities affecting information systems , and participating in other cybersecurity program activities, including risk… more
- Lockheed Martin (King Of Prussia, PA)
- …experience within the DoD or Intelligence Community\. * Knowledge of the Defense Information Systems Agency \(DISA\) Security Technical Implementation Guides ... **Description:** At Lockheed Martin Rotary and Mission Systems \(RMS\), we are driven by innovation and...to interface with numerous cognizant security agencies, customers, and senior managers\. * Knowledge of other security disciplines and… more