Job Abstract

Leads efforts to identify vulnerabilities and cybersecurity threats to programs, functions, products, applications, and systems. Uses various intelligence sources such as HUMINT, SIGINT, GEOINT, OSINT, and others to assess vulnerabilities and conduct security evaluations of hardware and software components, architectures, algorithms, and protocols. Analyzes and characterizes identified vulnerabilities and threats and assess the impact of these vulnerabilities and threats on the operations and mi... more details

Job Abstracts is an independent Job Search Engine. Job Abstracts is not an agent or representative and is not endorsed, sponsored or affiliated with any employer. Job Abstracts uses proprietary technology to keep the availability and accuracy of its job listings and their details. All trademarks, service marks, logos, domain names, and job descriptions are the property of their respective holder. Job Abstracts does not have its members apply for a job on the jobabstracts.com website. Additionally, Job Abstracts may provide a list of third-party job listings that may not be affiliated with any employer. Please make sure you understand and agree to the website's Terms & Conditions and Privacy Policies you are applying on as they may differ from ours and are not in our control.