- UpvoteDownvoteShare Job
- Suggest Revision
Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Make automation and security assessment tool development and implementation recommendation that assist with Red Team exercises and Penetration Testing. Understanding of security vulnerabilities and common software engineering flaws Infrastructure, product, and/or application level penetration or Red Team testing experience Knowledge of attacker lifecycles and defender strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from a variety of adversarial perspectives (white-, grey-, black-box.
$113,000 - $240,400 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deep architectural understanding of the following: Mitigation strategies to protect customer data and applications from threats and vulnerabilities, Secure code review and software composition analysis, Dynamic application security testing including penetration testing, Red Team assessment.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Department of Homeland Security (DHS) is recruiting professionals to support a range of developmental roles in Cybersecurity Data Science, including Data Scientist, Artificial Intelligence (AI) Specialist, AI Operationalization Analyst, Data Modeler, Data Security Analyst and Operations Research Analyst.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
There are a variety of Cybersecurity Data Science opportunities across the Department, including supporting several specialized programs at ), the. This announcement is being used to fill the Data Science Talent Pool. By applying to this job announcement, you are opting to be part of the DHS-CS Talent Pool for ongoing consideration for employment for relevant open jobs and will remain eligible for consideration for up to one year from the date of completion.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Leidos Health Mission Solutions is seeking a Network Security Team Lead, contingent upon contract award, on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Additional experience in engineering hardware and/or software, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and systems engineering, or system administration is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Management - manages team that will perform remediation management, reporting, and escalation of vulnerabilities identified through Cyber Resilience testing activities to include penetration testing and application security testing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conducting routine hypothesis testing using statistical processes applying quantitative techniques (e.g., descriptive and inferential statistics, sampling, experimental design) to assess the validity of source data and develop strategic insights from large data sets.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position is focused on Data Science. Building and applying an understanding of cybersecurity data management to develop data standards, policies, and procedures facilitating and implementing data mining and data warehousing programs to collect, clean, convert and standardize complex data for analysis.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain security policy and procedures, perform incident response and business continuity testing, work with the NIST Cybersecurity Framework and CIS Benchmarks, and assist with security audits as needed.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
There are a variety of Cybersecurity Data Science opportunities across the Department, including supporting several specialized programs at DHS Office of Strategy, Policy, and Plans (PLCY ), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA.
Full-timeExpandApply NowActive JobUpdated Today
network security data science penetration testing jobs Title: cybersecurity consultant
FEATURED BLOG POSTS
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.