- GovCIO (Richmond, VA)
- …protocols to safeguard systems and sensitive data. + Perform routine security audits and vulnerability assessments to proactively mitigate risks. + Ensure ... cloud environmentsforthe Department of Veterans Affairs.The candidatewillmaintaintheinfrastructure,ensureoptimalsystem performance, andupholdstringent security measures.This position is fully remote within the United… more
- Actalent (Fairfax, VA)
- …in LAN switches, routing architectures, and network services. + Experience in security vulnerability studies and defense-in-depth strategy. + Ability to develop ... As a Network Design Engineer, you will design and plan network systems by providing specifications and detailed schematics for network architecture. You will… more
- Nightwing (Sterling, VA)
- Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- General Dynamics Information Technology (Chantilly, VA)
- …requirements. Activities include detailed log analysis, network traffic monitoring, and vulnerability risk assessment. The individual will be expected to conduct ... assessments of software tools and systems to identify vulnerabilities, and work with internal and...stakeholders. + Collaborate with incident response, SOC, and other security teams to correlate findings and provide context. +… more
- Nightwing (Herndon, VA)
- Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers' ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- CACI International (Chantilly, VA)
- …person should have a wide range knowledge and skills, such as computer forensics/mobile device forensics, data recovery, reverse engineering intrusion analysis and ... methodologies, intelligence analysis, and vulnerability assessments. If chosen, YOU will have the opportunity...programs with peers who are dedicated to advancing national security . Participate in fun team outings and team building… more