|
Resume alert |
Resumes 61 - 70 of 70 |
Columbus, OH
... Philipp Koehn) at The Eighth Conference of the Association for Machine Translation in the Americas (AMTA-2008), Waikiki, Honolulu, Hawai'i. Title: Statistical Machine Translation: Theory and Practice. Honors & Awards University Fellowship (one year) ...
- 2012 Oct 02
Powell, OH, 43065
... Performed network vulnerability assessments for healthcare provider, and major manufacturing company. Results included recommendations in policy remediation and selection and implementation of countermeasures such as intrusion detection system, ...
- 2010 Dec 15
Hilliard, OH, 43026
... Managed Internal/External Vulnerability Assessments, Attack and Penetration Tests (Critical Watch). KPMG, LLP 2005 - 2007 Senior Manager, Information Risk Management Managed the Columbus and Indianapolis Offices Technology Risk Consulting practice. ...
- 2010 Oct 18
Columbus, OH, 43235
... girl twice a week throughout college Iota Chi social club: Harding University: (2005 2009) Founder and Charter Member Honolulu, Hawaii Spring Break Campaign: (2009) Conducted classes for children Ronald McDonald House: (2009) Cooked and cleaned ...
- 2010 Sep 30
New Albany, OH, 43054
... Security vulnerability analysis and mitigation. . Proficient in a variety of operating systems and software applications . Designed and Maintained team's wiki page
- 2010 Sep 23
Powell, OH, 43065
... in creating synergy between teams, regulatory agencies, legal, operations, engineering, business, and partners to identify risks, create mitigation controls, and deploy strategies to minimize vulnerability, reduce risk, and achieve compliance. ...
- 2010 Sep 22
Pickerington, OH, 43147
... Security Products Checkpoint Firewall-1/VPN-1, Cisco PIX/ASA, Cisco Secure ACS, Secure Computing, Snort, Microsoft IIS Vulnerability Assessment and Penetration Testing Tools Nessus, AppScan, Ethereal/Wireshark, LOphtcrack, John the Ripper, Nmap ...
- 2010 Sep 12
Galena, OH, 43021
... IT Security Manager - Security standards, policies, compliance oversight, risk assessment and mitigation, vulnerability monitoring, intrusion detection, identity and access management, regulatory compliance (e.g. SOX, PII, NERC/CIP). Team of 10 ...
- 2010 Aug 09
Dublin, OH, 43065
... researched and analyzed affected software or hardware and new products and sources Prioritized and determined threat ranking, category and types of vulnerability Extensive research and translation of code to find fixes, updated software, or ...
- 2010 Jul 26
Columbus, OH, 43026
... achieve compliance • Initiated work towards Unified Control Framework for compliance • Started and successfully implemented vulnerability management program • Developed risk assessment template and testing for plans point of sales systems • Perform ...
- 2009 Sep 08