- Suggest Revision
- The AppSec Analyst will report to the Chief Information Security Officer (CISO) and work closely with other members of the information security team.
- This individual will be responsible for performing application security assessments, conducting security testing, and working with development teams to ensure secure coding practices are followed.
- Perform application security assessments to identify vulnerabilities in applications and systems
- Develop and maintain application security policies, standards, and guidelines
- Stay up-to-date with the latest application security trends and best practices
- UpvoteDownvoteShare Job
- Suggest Revision
Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for presence of the vulnerability, and work with the DHS/CISA Security Operations and enterprise networking teams to proactively block exploitation within the DHS environment.
ExpandApply NowActive JobUpdated 23 days ago A top-notch Certified Ethical Hacker quickly identifies security flaws and provides useful advice on how to improve the system.
As a certified ethical hacker, you will be required to research the type of system being used, find ways to penetrate the system, and identify any weaknesses.
- UpvoteDownvoteShare Job
- Suggest Revision
LPT Licensed Penetration Tester. CEH Certified Ethical Hacker. GXPN Exploit Researcher and Advanced Penetration Tester. In addition to specific clearance requirements all Department of Homeland Security CBP SOC employees are required to have or be able to favorably pass a 5 year (BI) Background Investigation.
ExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Hacking Forensics Investigator (CHFI) EC-Council Certified Security Analyst (ECSA) Licensed Penetration Tester (LPT) GIAC Reverse Engineering Malware (GREM) Certified Ethical Hacker (CEH.
ExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Certifications (e.g., GIAC Certified Penetration Tester (GPEN), GIAC Web Application Penetration Tester (GWAPT), or GIAC Exploit Researcher and Advanced Penetration Tester (GXPN.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OneZero Solutions is seeking a motivated Tier 1 SOC analyst to join our team on a highly visible cyber security single-award IDIQ vehicle. Experience in an information technology field with a minimum of 5 years of experience in the areas of incident detection and response, malware analysis, or computer forensics.
Full-timeExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP - Certified Information Systems Security. ECSA - EC-Council Certified Security Analyst. · 5+ years as a SOC analyst or similar work roles· In-depth knowledge of each phase of the Incident Response life cycle.
ExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CPTE - Certified Penetration Testing Engineer or CEH - Certified Ethical Hacker. Must possess a minimum of a Bachelors Degree in Computer Science , Information Technology or Information Security (Masters Degree preferred.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications (e.g., CISSP, CompTIA Security+, Certified Ethical Hacker) preferred. Perform monthly security patching working closely with CISO and Application Development teams to test and pilot system and security patches prior to deploying to production environments.
ExpandApply NowActive JobUpdated 1 days ago The Training Room can help you smash your potential by giving you the tools and support you need to become a certified and industry ready Ethical Hacker.
If you would enjoy a deeply technical, fun and casual atmosphere, and are interested in hacking in a professional work environment, GDS is the place for you!
- UpvoteDownvoteShare Job
- Suggest Revision
Assist with information security awareness program to ensure staff members across the. Certified Ethical Hacker (CEH) prior to start. Bachelor's degree in Information Security, Information Systems, or related discipline and 8.
ExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Title: IT - Information Security/Privacy Analyst IV. Must possess a minimum of a Bachelor’s Degree or Master’s Degree, PhD or JD in a technical specialty such as cyber security, computer science, management information systems or related IT field (Master's Degree Preferred.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as ethical hacker, penetration tester, SANS GIAC, etc. Lead in the creation of documents that integrate threat intelligence reports, open source analysis, and Federal Reserve System information to communicate the aggregated results to people who need to know the results (e.g., government decision-makers, security officials, senior corporate officials.
ExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must posses a minimum of a Bachelors Degree or Masters Degree , PhD or JD in a technical specialty such as cyber security, computer science, management information systems. The candidate should demonstrate expertise and experience with enhancing cyber security risk mitigation functions, including process improvements, risk assessments and transactional security validation.
ExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cyber Security Engineer develops actionable security blueprints, principles, models, designs, standards and guidelines to ensure enterprise information technology architecture and support is consistent, usable, secure and adds value to the business.
RemoteExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ESSENTIALJOB FUNCTIONS:Supervises Security Operations Division staff within the Information Security and Privacy Office, working with the Chief Information Security Officer (CISO) to ensure efficient and effective security operations and proper training, software, equipment, and resources for the Security Operations team.
$109,705 - $146,704Full-timeExpandApply NowActive JobUpdated 1 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participant in the monthly DoD Chief Information Officer DevSecOps Community of Practice to share best practice and lessons learned from practitioners using DevSecOps processed.
ExpandApply NowActive JobUpdated 23 days ago