MatchPoint is a fast-growing, young, energetic global IT-Engineering services company with clients across the US. We provide technology solutions to various clients like Uber, Robinhood, Netflix, Airbnb, Google, Sephora and more! More recently, we have expanded to working internationally in Canada, China, Ireland, UK, Brazil and India. Through our culture of innovation, we inspire, build, and deliver business results, from idea to outcome. We keep our clients on the cutting edge of the latest technologies and provide solutions by using industry specific best practices and expertise.
We are excited to be continuously expanding our team. If you are interested in this position, please send over your updated resume. We look forward to hearing from you!
Job Summary:
This product focused position Conducts hardware and software cybersecurity evaluations, assist engineering, and vulnerability research on new and existing products. Develops and refines new Tactics, Techniques and procedures (TTP) on an ongoing basis, and ensures cybersecurity requirements are fully integrated. Conducts comprehensive cybersecurity reviews to evaluate potential vulnerabilities in cyberspace domain of products.
Key Responsibilities:
· Conducts vulnerability scans, analyzes findings, and makes recommendations to help mitigate or eliminate vulnerabilities in products.
· Identifies systemic issues within products based on the analysis of vulnerability findings, configuration assessments and derived metrics.
· Troubleshoots hardware/software interfaces and interoperability between integrated systems.
· Conducts system engineering and research to develop new solutions that ensure cybersecurity requirements are being met.
· Provides guidance on compliance to product cybersecurity standards
· Integrates and aligns cybersecurity system configurations to ensure product performance meets documented requirements.
· Conducts and/or supports authorized penetration tools and testing on products.
· Provides guidance on designs or redesigns hardware, operating systems, and software applications to adequately address cybersecurity requirements.
Education, Licenses, Certifications:
College, university, or equivalent degree in Computer Science, Electrical Engineering, or related subject, or relevant equivalent experience required. This position may require licensing for compliance with export controls or sanctions regulations.
Experience:
Industrial controls or embedded cybersecurity work experience is required. Prior Senior or Lead Engineer equivalent work experience in a relevant discipline area is required with a demonstrated track record of technical problem solving and quality decision making. High familiarity with Windows and linux OS hardening techniques Preferred. Certified Ethical Hacker (CEH), CompTIA CySA+ or similar certification preferred.
Location: MN (access to Product Cyber Security Lab required)
...Automation. The role involves designing and implementing cutting-edge solutions to drive digital transformation and business growth within eCommerce space. This will require someone who is comfortable in developing and mentoring product team as well as getting on pre-sales...
...Pay: $18 - $31 per hour Start Date: End of Week Location: Tempe, AZ Job Description Part-time sitter needed for two middle schoolers and a dog. Must be reliable, experienced, and dog-friendly. Hours are flexible. Parent / Family Information Location...
...critical thinking skills. Applicants must also be organized, able to work well under pressure, and have excellent communication skills.... ..., and evidentiary rules. Salary is commensurate with experience. The city's comprehensive benefits package comes with the position...
REQUIRED SKILLS AND EXPERIENCE - Bachelor's degree in analytics, mathematics, statistics, data science, or a related field - 2+ years of experience in analyzing and interpreting data, identifying trends, and providing insights - Experience with BI visualization tools...
...the content and quality of digital maps that are used by millions of people worldwide Completing research and evaluation tasks in a web-based environment, such as verifying and comparing data, and determining the relevance and accuracy of information. Join us...