- CVS Health (Boston, MA)
- …to make health care more personal, convenient and affordable. **Position Summary** The Vulnerability Analysis Staff Engineer is responsible for performing an ... of security frameworks, and a proactive mindset. **Key Responsibilities** Vulnerability Assessment + Analyze vulnerability scan results and additional risk… more
- CVS Health (Boston, MA)
- …personal, convenient and affordable. **Position Summary** The External Attack Surface Management Staff Security Engineer is responsible for leading efforts ... Security Essentials (GSEC) or GIAC Penetration Tester (GPEN) + Offensive Security Certified Professional (OSCP) + Qualys Vulnerability Management Detection… more
- Caris Life Sciences (Boston, MA)
- …maintain automation pipelines for various tasks, including compliance reporting and security vulnerability scanning. + Design, implement, maintain, and optimize ... **Position Summary** The Staff DevOps Engineer is responsible for...database environments, including MySQL, PostgreSQL, and RDS. + Implement security compliance projects, such as SOX compliance and SOC2… more
- Lumen (Boston, MA)
- …System (NCPS) initiatives. This role will work seamlessly with the ISSM and other IT Security staff to create a holistic and fully integrated IT Security ... including validation of system software and hardware configurations. + Perform security analysis and risk/ vulnerability assessments and coordinate with ISSO… more
- Sumaria Systems, Inc. (Bedford, MA)
- … Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of ... Cybersecurity Engineer , Journeyman Department: SAS DAYTON, OH Office: Hanscom...ABP 005. + Review RFV artifacts including the site security test reports, PPSM, site POA&M, and all applicable… more
- Optiv (Boston, MA)
- …fully remote and can be hired anywhere in the continental US_ The Sr. Splunk Engineer works within the Optiv Security 's 24x7x365 Security Operations Center ... experience withSplunk + Experience with Cribl preferred + Experienced with multiple security concepts and methods, such as vulnerability assessments, data… more
- The MITRE Corporation (Bedford, MA)
- …IDA Pro, Emulators) + Operating System Internals/Driver development + Computer Networking & Security + Vulnerability Discovery and Analysis + Developing C and ... sponsors in partnership with other organizations across MITRE National Security (MNS) and MITRE Labs organizations. Our focus is...impact of our sponsors on their core missions. Our staff maintain deep expertise in the relevant complex systems… more
- Dynatrace (Waltham, MA)
- …under VMware ESXi 7/8 and Amazon EC2 + Responsible for maintaining security standards, patch deployment and vulnerability remediation across server ... infrastructure + Administers Microsoft Office 365 and email security products + Manage internal and external DNS using...to document solutions and define procedures + Mentors junior staff and cross trains peers and other teams on… more
- Black & Veatch (Burlington, MA)
- …:** Black & Veatch Corporation **Req Id :** 106520 **Opportunity Type :** Staff **Relocation eligible :** No **Full time/Part time :** Full-Time **Project Only Hire ... multiple engagement phases. In this role, you will assess/support clients' security posture, develop recommendations to enhance their programs and technologies, and… more
- The MITRE Corporation (Bedford, MA)
- …mission areas: cyber resiliency, cyber survivability, defensive cyberspace operations, vulnerability assessments, systems security engineering, cyber tabletop ... analysis to advise senior leaders and decision-makers across the national security enterprise. Our evidence-based work garners visibility and provokes thought and… more
- MIT Lincoln Laboratory (Lexington, MA)
- …and development in Radio Frequency (RF) signal analysis + Reverse- engineer hardware and/or software systems and develop proof-of-concept capabilities exploiting ... various hardware transmitters such as Software Defined Radios (SDR's) + Conduct vulnerability analysis on wireless, mobile, or advanced computing systems + Model a… more