Post Job Free

Analyste or Exploitation resumes in United States

Sign in
Search for: Jobs   Resumes


Distance: Resume alert Resumes 111 - 120 of 2105

Project Manager Information Technology

Rahway, NJ
... (Facilitated apprehension of persons allegedly involved in terrorism, organized crime, money laundering, child exploitation, human trafficking, and payment card/financial fraud). uImplemented automated audit processes to manage GDPR, HIPAA, PCI, FCC ... - Feb 10

Control Room Director / Managemet / IT / Cyber Security / Agile

Holly Springs, NC
... • Penetration Testing: Network vulnerability scanning, and exploitation using Nmap, Nessus, Metasploit, and Burp Suite. • Security Analysis & Threat Detection: Investigated network traffic with Splunk/Wireshark; analyzed threats using MITRE ATT&CK. ... - Feb 09

Customer Service Property Claims

Havertown, PA
... • SIU Investigator, CoventBridge, Jan 2022 - Mar 2024, Morgantown, Pennsylvania Conducted interviews concerning allegations of abuse, neglect, or exploitation, achieving an average interview completion rate of 100%. • Analyzed complex information ... - Feb 07

Cyber Security Help Desk

Seneca, SC
... / Support ● Project Coordination / Execution ● Network Migration ● Vulnerability testing/ Assessment ● Network Exploitation and Mitigation Strategies and Operations ● Amazon AWS Secure Infrastructure ● Systems Security Mitigation Key Words: ... - Feb 06

Assisted Living Call Center

Houston, TX
... Services Houston, TX August 2009-August 2021 Investigator Lvl IV with Adult Protective Services ●Conducted investigations of adult care facilities, group homes, and private residences to address allegations of abuse, neglect, or exploitation. ... - Feb 06

Business Analytics Power Bi

Bellingham, MA
... ● Gained proficiency in applying reinforcement learning concepts such as the Bellman Equation, policy iteration, and the exploration/exploitation dilemma. - Feb 03

IT support, system admin and troubleshooting

Austin, TX
... Set up a Command and Control (C2) server (BYOB) to simulate post-exploitation and created a mini-botnet for security analysis. 2. Dockerized Pentesting Environment Self-hosted an attacker machine (Kali Linux) and a vulnerable machine (Metasploitable ... - Feb 03

Network Security Information

Mackinaw City, MI, 49701
... Web App Exploitation; SIEM Log Analysis Hashing and Cryptographic Validation; Encryption and Decryption; Intrusion Detection and Network Security Monitoring with Snort3 and Zeek Windows Process Exploration; Windows Filesystem Permissions; Applying ... - Feb 03

Cybersecurity Analyst Cloud Security

Dallas, TX, 75201
... • Conducted proactive threat hunting using advanced tools like Splunk, CrowdStrike, SentinelOne, and EDR solutions to identify and mitigate potential vulnerabilities before exploitation.. • Documented security breaches, assessed damage, prepared ... - Feb 03

North Carolina Active Ts

Fort Liberty, NC, 28307
... and Verbal Language Proficiency in Pashto, Dari, and English Excellent Transcriptional Skills • Trained in Document Exploitation • Competent in Afghan Culture EXPERIENCE Feb 2015 to Nov 2021 Pashto/Dari Linguist, World Wide Language Resources - ... - Feb 01
Previous 9 10 11 12 13 14 15 Next