- UpvoteDownvoteShare Job
- Suggest Revision
We are: We provide innovative and comprehensive services and solutions that span cloud; systems integration and application management; security; intelligent platform services; infrastructure services; software engineering services; data and artificial intelligence; and global delivery through our Advanced Technology Centers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role supports the Threat Intelligence Data & Engineering (TIDE) function in State Street’s Cyber Threat Intelligence (CTI) team. Experience leveraging security, intelligence, and/or OSINT platforms to support or perform cyber threat intelligence tradecraft and intelligence production.
$90,000 - $142,500 a yearFull-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Threat Intelligence Lead works with the cyber defense team to make accurate, risk-based decisions on where to focus security efforts that will protect our employees, operations, and revenue streams to yield the highest ROI from expended security resources.
$200ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Associates within TRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, and risk management professionals. At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified.
$233,100 a yearExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with integrating quantum resilient/post-quantum cryptography in embedded software/middleware stacks. ; 2) conducting offensive cyber researcher such as vulnerability research and exploit development against embedded systems; and 3) scripting languages like Python in a Linux-like environment.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience developing software targeting embedded SoCs such as ARM, NXP, Microchip, etc. Proven industry experience as an Embedded Software Engineer, with a focus on embedded systems and low-level programming.
$125,000 - $185,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a key member of the Controls Engineering Team, you will be instrumental in developing and refining the Aerostat Autopilot, the core component of every SuperTower ( Collaborating closely with aerodynamics, system modeling, and software teams, as well as with systems, field operations, and manufacturing, you will drive innovation and excellence in our control systems.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BS/MS degree in Computer Science, Software Engineering, or a related subject. We are a group of experienced technologists that have especially strong skills in building complex systems that incorporate data analytics, artificial intelligence, cloud computing, machine learning, distributed sensors, robotics, and data visualization.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience must include a minimum of 3 years experience in a support & operations or design & engineering role in any of the following areas: access management or network security technologies, servers, networks, Network communications, telecommunications, operating systems, middleware, disaster recovery, collaboration technologies, hardware/software support or other infrastructure services role; or any combination of education and experience, which would provide an equivalent background.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience of vulnerabilities, intrusion detection systems, firewall management, network vulnerability analysis, cryptographic theory and practice, incident analysis and response, software testing and security assessment, malicious code and software exploitation techniques, continuous monitoring and event logging, cyber-crimes, computer forensics analysis and computer crime investigation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of hardware implementation of various accelerator IPs such as AI/ML, ISP, etc., as well as embedded software, especially Real-time Operating Systems and Hypervisors. Translate organizational needs into concrete semiconductor requirements, specifically targeting AI/ML, real-time operating systems, hypervisors, and various other embedded and accelerator IPs.
$150ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
An advanced degree in computer science, data science, machine learning, artificial intelligence, operations research, engineering, or related quantitative discipline. Equilibrium is composed of deeply knowledgeable industry experts across all our functions, with decades of experience in energy-specific commercial structuring, power systems engineering, machine learning, computational research, operations research, distributed and compute-intensive infrastructure, and modern software & ML engineering.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Test software to ensure the changes meet the expectations of the team, meet required team standards including security & accessibility, and do not introduce errors with existing software, including the creation of unit and integration tests in Junit, Jest or similar technologies within the stack.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber A&E Audit & Regulatory Lead will play a critical role in the Cyber Architecture & Engineering (A&E) function within GCS. Cyber A&E designs, architects, deploys, and continually enhances security measures for the protection of State Street's information related to its assets and customers.
Full-timeExpandApply NowActive JobUpdated Today
software engineering embedded cyber security intelligence jobs in Quincy, MA
FEATURED BLOG POSTS
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?