Post Job Free

Analyste or Exploitation resumes in United States

Sign in
Search for: Jobs   Resumes


Distance: Resume alert Resumes 221 - 230 of 2104

High School Case Manager

San Antonio, TX
... • Participated in Task Force operations to investigate cases of abuse, neglect and/or financial exploitation. • Pushed for operational changes that resulted in cost savings and higher profit margins • Had an excellent attendance record and was ... - 2024 Sep 03

Information Security Application

Royse City, TX
... Key areas include network exploitation, web application security, privilege escalation, buffer overflow exploits, wireless security, scripting, report writing, time management, ethical conduct, and cryptography. The OSCP certification is hands-on ... - 2024 Sep 03

Real Estate Fast Casual

Montgomery, TX
... a single franchise to six units without debt financing thru lean profitable operation, effective exploitation of economies of scale, hands on leadership of daily operations and growth minded team building • Added a full-service catering division. ... - 2024 Sep 02

Direct Support Professional

Silver Spring, MD
... in Cases of Abuse, Neglect, and Exploitation ● Promoting Community Integration and Inclusion for Direct Support Professionals ● Seizure Disorders ● Windows 2010, 2017 ● Typing Speed of 45wpm ● Professional, Friendly, Punctual and a Team Player - 2024 Sep 01

Customer Service Financial Aid

Prosper, TX
... Develops an overall vendor base which creates and sustains a competitive advantage, utilizing global market exploitation, leveraging spend, and Manages all activities that develop relationships with suppliers. Heavy metric reporting and presentation ... - 2024 Aug 31

Web Application Penetration Testing

Edmond, OK
... I conducted penetration testing assessments, external and internal networks, and wireless networks to identify and help mitigate security vulnerabilities: I used tools such as Metasploit for exploitation, Nmap for network discovery, Burp Suite for ... - 2024 Aug 27

Information Security Risk Management

Indianapolis, IN
... • Key areas of training and improvement include Open-Source Intelligence, Cryptography, Password Cracking, Log Analysis, Network Traffic Analysis, Wireless Access Exploitation, Forensics, Scanning, Web App Exploitation, Enumeration and Exploitation. ... - 2024 Aug 27

It Specialist Vulnerability Management

Shreveport, LA
... By adopting these updates as quickly as feasible, businesses can successfully lower the risk of exploitation while also strengthening the overall security posture of their infrastructure. Patch management also includes testing fixes in a controlled ... - 2024 Aug 27

Sr Research Engineer / Scientific Programmer (MATLAB, python, EO/IR)

Boynton Beach, FL, 33435
... Aelius Exploitation Technologies April 2022 - March 2024, US, FL (remote: Delray Beach) Sr. Engineer (Scientific Software & Analysis) •Image processing & analysis for real-time anomaly & object detection from airborne platform, using nVidia edge ... - 2024 Aug 27

Cyber Security Information Systems

Woodbridge, VA
... Prepared detailed training requirements of the ISR duty positions in Analysis- Correlation-and-Fusion, ISR-Operations-Processing-Exploitation-Dissemination; and Targeting functions at the operational level of war within an AOC. Analyzed and ... - 2024 Aug 26
Previous 20 21 22 23 24 25 26 Next