- UpvoteDownvoteShare Job
- Suggest Revision
The right candidate for this role is a Security Champion who has experience across Network, Datacenter infrastructure, cloud, application security and familiar with threat modeling, CIS, NIST Standards and is able to influence and ensure its realization through direct and indirect influence.
$164,700 - $247,000 a yearExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This position requires application of large-scale hydrologic modeling with specialization in high-performance computing, artificial intelligence, machine learning, remote sensing, and cloud computing.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cloud Security Architect will direct and guide other technology teams within Crown Castle for all matters related to cloud security strategy and implementation, including Security Tools within Cloud ecosystems (Azure and AWS), Network IPS/IDS, Identity and Access Management (IAM), User Entity and Behavior Analysis (UEBA), Zero Trust, DevSecOps, Security Access and Service Edge (SASE) and Security Frameworks and Methodologies, and Threat Modeling.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Broad knowledge of traditional security controls and technologies, such as Security Information and Event Management (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), antivirus and firewalls, in addition to newer offerings such as endpoint detection and response (EDR), threat intelligence platforms, security automation and orchestration, deception technologies and application controls.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Position requires practical application of: Independently formulating and applying design of experiments, Independently formulating and applying analytical tools, specifically: means, medians, percentiles, deviations, ANOVA, Generalized Linear Regression, Logistic Regression, and Factor Analysis, Independently creating automated analytical tool sets as necessary, Academic and practical application of the verification, validation and accreditation of modeling and simulation.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Mentor technical staff and development teams to successfully work to deadlines, often while successfully managing to multiple competing priorities Qualifications BS or MS in Aerospace Engineering, Systems Engineering, Electrical/Computer Engineering, or equivalent with 3-5 or more years of relevant experience in enhancing National Security through the application of advanced technology to system level solutions.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Or JavaDeep understanding of application architectures and design principlesExperience with Threat Modeling applications using STRIDE or a similar frameworkKnowledge of common security flaws and mitigations as published by OWASP, SANS, etc.
$130,900 - $244,300 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In order to be considered for this position candidates are required to submit an application for employment through our career site, be at least 18 years of age, willing to take a drug test, submit to a background investigation as part of the selection process, as well as additional periodic background checks as required by the Chemical Facility Anti-Terrorism Standards (CFATS) or regulations adopted by the department of Homeland Security or other regulatory agencies.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Data Engineering AnalystJob Description Summary: The position is within ICG Technology, and we are seeking a Data Engineer with strong hands-on experience in Data Engineering, Scripting and Modeling.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
CLEARANCE REQUIREMENTS: Department of Defense Secret security clearance is preferred at time of hire. Participates in Modeling and Simulation. Researches and analyzes data, such as vendor products, COTS components, GFE/CFE, specifications, and manuals to determine feasibility of design or application.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the following: JEE (EJB, JPA, JTA, JAX‐B, JAX‐RS, JAX‐WS), SQL, application servers (Tomcat, WebLogic, JBoss), scripting. scripting languages, object‐oriented modeling tools, low‐level programming, serialization/deserialization, and dependency injection.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Investigate and repair application defects regardless of component: RPA, vendor integration, front-end, business logic, middleware, or database (PL/SQL and Data Modeling). Join one of our high performing teams responsible for building the next-generation business solutions using Robotic Process Automation, supporting the Social Security Administration (SSA) and their mission to meet the changing needs of the public, positively impacting at least 65 million American lives per month.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
What You'll Be Doing:Innovate and advance the science of counter insider threat and national security psychology by improving existing methods and developing new methods to deter, detect and mitigate potential threats through behavioral science R&D and the application of scientific rigor to current methods.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Utilize SharePoint SPFx, Power Platform, Windows Servers, Microsoft SQL, Visual Studio, Azure Cloud, Azure DevOps, Virtualization (VMWare or Hyper-V), C#, Java Script, T-SQL, HTML, CSS, JSON, Visio, InfoPath, Designer, PowerShell, Python, R and related technologies for application and solution development.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As part of the University’s commitment to maintaining a healthy and safe living, learning, and working environment, we encourage you to read Miami University’s Annual Security & Fire Safety Report at: which contains information about campus safety, crime statistics, and our drug and alcohol abuse and prevention program designed to prevent the unlawful possession, use, and distribution of drugs and alcohol on campus and at university events and activities.
Full-timeExpandApply NowActive JobUpdated 7 days ago
application security modeling jobs
FEATURED BLOG POSTS
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.