- Baylor Scott & White Health (Montgomery, AL)
- **Job Summary** As the Manager of Vulnerability Management you will paly a key role in the success of the vulnerability and configuration management ... managed service provider that performs the day-to-day functions of the vulnerability and configuration management program . **Responsibilities:** + Provide… more
- TEKsystems (Montgomery, AL)
- …1 senior level opening The ACAS Systems Operator duties include vulnerability assessment analysis and administration of cybersecurity-oriented principles to protect ... compliance baseline configuration, inventory, and best practices for the vulnerability management solution (VMS) deployed across multiple unclassified and classified… more
- Old Dominion Freight Line (Montgomery, AL)
- …lead the development of cybersecurity strategies, provide expert guidance on technical security solutions, and ensure the effective implementation of security ... mitigate risks across the enterprise. This position requires a high level of technical expertise, strategic thinking, and the ability to collaborate across teams to… more
- TEKsystems (Montgomery, AL)
- …document security artifacts related to DISA Security Requirements or Technical Implementation Guide (SRG/STIG) checklist documentation on supported systems utilizing ... technical procedures, best practices, or vendor hardening guidance *...participate in the review and response phases of the Vulnerability Management (VM) life cycle * Aptitude to support… more
- PagerDuty (Montgomery, AL)
- …team! As a Senior Security Engineer, you will be a key technical leader driving security initiatives across PagerDuty's SaaS offerings, with deep expertise ... and implement security automations and tool integrations + Develop automated vulnerability management workflows to drive timely remediation + Implement automated… more
- PagerDuty (Montgomery, AL)
- …cute animal memes. **KEY RESPONSIBILITIES** + Embrace the role of hands-on technical lead in defining product security standards and guiding platform protections. + ... preferably AWS. + Familiarity with cloud-native product technologies including: + Vulnerability detection via multiple approaches including SAST, DAST, SCA, and… more