Post Job Free

Analyste or Exploitation resumes in United States

Sign in
Search for: Jobs   Resumes


Distance: Resume alert Resumes 91 - 100 of 2105

Nursing Home United States

Charlotte, NC
... (This could be to avoid prosecution, being taken into custody, or going to jail.) Aggravated sexual abuse, murder, sexual No exploitation and other related abuse of children, Federal or State offense involving sexual assault, or an offense under ... - Mar 05

De Données La

Cardinal Village, TX, 75062
... EXPÉRIENCE PROFESSIONNELLE RICOH Canada Depuis Décembre 2023 Responsabilités principales : Field Specialist, Technology service o Fournir un rôle-conseil en soutien, exploitation et évolution des équipements bureautiques et des logiciels; ... - Mar 04

Senior Acquisition Analyst

Glen Burnie, MD
... Worked with C4ISR systems to provide a common tactical picture to commanders, collect and disseminate information for decision- making, synthesize operations, and permit the rapid gathering and exploitation of intelligence. Logistics Readiness ... - Mar 04

Developmental Disabilities Corporate Compliance

Vincennes, IN
... Exploitation of an endangered adult 6. Failure to report battery, neglect, abuse or exploitation of an endangered adult or abuse or neglect of a child 7. Theft, if the conviction for theft occurred less than 10 years before the employment ... - Mar 03

Risk Management Cyber Security

Greensboro, NC, 27413
... Attempted controlled exploitation of identified vulnerabilities using Metasploit, focusing on demonstrating how malicious actors could gain unauthorized access to sensitive data. All ethical hacking attempts were carefully documented and authorized ... - Mar 03

System and Security Admin

Las Vegas, NV
... technical skills • Program/Scripting Languages: Python, Go, Bash • Operating Systems: Windows (server and desktop), Linux (many distributions) • Web Scanner/Exploitation: owasp-zap, nessus, dirbuster, whatweb, beef, sqlmap • Networking: nmap, ... - Feb 27

Information Technology Security Clearance

Oak Harbor, WA
... • As key Information Operations Planner for USS Wasp Amphibious Readiness Group, managed defensive and offensive cyber operations comprised of computer network defense, threat detection (Splunk), exploitation analysis, threat emulation, and digital ... - Feb 27

Information Systems and Personnel Security Mgmt. and Administration

Chesapeake, VA
... • Interpreted and implemented DOD CNO policies into NAVCENT strategic planning, including Computer Network Defense (CND), Computer Network Exploitation (CNE), and Computer Network Attack (CNA) planning. • Served as Assistant Department Head of a 39 ... - Feb 26

LCSW Clinical Director

Cudahy, CA
... ● Adult Protective Service- by San Diego State University ● Cognitive Behavioral Therapy- by CCAPP ● Commercial Sexual Exploitation of Children –by Department of Children and Family Services ● Crisis Prevention Intervention -Trained by Whittier Area ... - Feb 24

Cybersecurity, Information Technology

Plymouth, MA, 02360
... • Delivered real-time intelligence support and TPED (Tasking, Processing, Exploitation, and Dissemination) for national and joint missions. • Analyzed multi-source intelligence data, providing critical insights for military and national security ... - Feb 22
Previous 7 8 9 10 11 12 13 Next