- ARSIEM (Arlington, VA)
- …client you work with. ARSIEM is looking for a Network Based Systems Analyst IV (Cyber Information Technologies Requirements Manager) . This position will support one ... and databases. + Experience with and technical understanding of cybersecurity attack-mitigation techniques and cybersecurity architectures + Experience… more
- Watershed Security (Norfolk, VA)
- …with IA / INFOSEC concepts and requirements: Firewall Policy, Ports & Protocols, Cybersecurity , Cybersafe, DoD/DON RMF processes and standards, etc. + Experience ... Center and Nessus scanner issues. + Assist with selecting RMF Security Controls. + Develop technical documents like ...Clearance + Bachelor of Science (BS) in Information Technology, Cybersecurity , Engineering or similar + Current IAT Level III… more
- V2X (Reston, VA)
- …Mid-Level (3-7 Years Experience) + Information Systems Security Officer (ISSO) + Cybersecurity Compliance Analyst + Security Controls Assessor + Risk Management ... in:✔ Information assurance and risk management✔ NIST 800-53, Risk Management Framework ( RMF ), and DoD cybersecurity policies✔ Security control assessments and… more
- SAP (Herndon, VA)
- …you to grow and succeed. **SAP NS2 Senior Information Security Compliance Specialist** Security Analyst (SA) will work as a member of the SAP NS2 cyber team. The ... in an environment with changing unconfirmed policy, eg, NIST RMF and DISA SRG . Document multiple courses of...Demonstrated knowledge and the ability to analyze systems for Cybersecurity compliance . Ability to work in fast-paced, team-oriented… more
- CACI International (Ashburn, VA)
- …with team members, other product teams, shared services teams such as cybersecurity , and other stakeholders within Agile methodologies. **More About the Role** The ... processes stay in sync with business processes. + Work with the cybersecurity engineer to create System Interface Agreements (SIA) for all data exchanges.… more
- Huntington Ingalls Industries (Reston, VA)
- …in cyberspace and anticipate emerging threats. Our capabilities in cybersecurity , network architecture, reverse engineering, software and hardware development ... one or more of the following: system administration, computer security, cybersecurity methodology, IT risk management tools, certification and accreditation through… more