Omaha, NE
... - reconnaissance, scanning, enumeration, gaining access, escalation of privileges, and maintaining access, network exploitation, covering tracks). Draft processes and procedures associated with daily operations. Solutionary, Omaha, NE 04/2010 – 12 ...
- May 16
Cincinnati, OH
... Security Researcher and Practitioner Highly skilled Offensive Security Researcher and Practitioner with extensive experience in wireless security, man-in-the-middle attacks, web application exploitation, and post-exploitation network pivoting. ...
- May 15
Port Neches, TX
... • Role: Performed reconnaissance, vulnerability scanning, and exploitation using industry- standard tools, documenting findings and remediation recommendations in a detailed report. • Tools: Utilized tools such as Nmap, Metasploit, BloodHound, ...
- May 13
San Francisco, CA
... • Confirm Level I exploitation and prioritize evidence and case accordingly. Ensure storage compatibility and accountability of samples and components awaiting transfer to Level III exploitation APCFC Fabricator/Instructor/Trainer Senior Consultant ...
- May 13
Herndon, VA
... Leveraged knowledge of insider threat lifecycle, including attacks, attack vectors, exploitation methods, and intrusion set TTPs to ensure operational fitness. Recognized for adding after-action report (AAR) for a customer by conducting two NIPR ...
- May 08
Denton, TX
... ●Conducted vulnerability assessments and security audits, leveraging Tripwire's solutions to identify security weaknesses, non-compliance issues, and potential areas of exploitation. ●Collaborated with clients to develop customized security policies ...
- May 08
New York City, NY
... Supported the exploitation of such opportunities by performing segment-by-segment strategic and tactical market, distribution and financial analyses and by developing the blueprint for the alliance to take advantage of the inherent synergies between ...
- May 08
Satellite Beach, FL, 32937
... SOFTWARE ENGINEER (2010 to 2013) Upgraded and enhanced capabilities for geospatial processing and exploitation tools in Solaris and Linus environments. Maintained 100% on-time software baseline deliveries and 150k+ lines of code, and won multiple 95 ...
- May 08
Marietta, GA
... Strengthened API security using Apigee Gateway, Cloud Armor, and Model Armor, preventing exploitation and safeguarding systems. Utilized Docker containers for scalable, high-performance, and portable deployments. Collaborated with product managers ...
- May 07
Miami, FL
... Prevention Education 2022, Age Specific Care and Cultural Awareness • Documentation Review • Reporting Abuse, Neglect, Exploitation, & Human Trafficking • Mental Health First Aid Certificate, CPI Non-Violent Crisis Intervention • TDD/TTY Hotline ...
- May 05