- Marriott (Bethesda, MD)
- …vulnerabilities, exploits, and application security best practices + Work closely with the Senior Manager to continuously improve the testing processes and tool ... The ideal candidate will have a solid foundation in secure coding practices, vulnerability detection, and testing techniques such as SAST, DAST, and manual testing.… more
- Amentum (Columbia, MD)
- …system or program * Provide support to the information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for ... meet security requirements for processing classified information. * Perform vulnerability /risk assessment analysis to support security authorization. * Provide… more
- Amentum (Columbia, MD)
- …system or program. + Provide support to the information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for ... meet security requirements for processing classified information. + Perform vulnerability /risk assessment analysis to support security authorization. + Provide… more
- ARSIEM (Annapolis Junction, MD)
- …system or program + Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for ... meet security requirements for processing classified information. + Perform vulnerability /risk assessment analysis to support security authorization. + Provide… more
- General Dynamics Information Technology (Bethesda, MD)
- …private information security groups and organizations. + Possesses experience with communicating vulnerability results and risk posture to senior executives. + ... **Job Family:** Cyber and IT Risk Management **Skills:** Computer Security, Cybersecurity ,Documentations **Experience:** 8 + years of related experience **US… more
- COMSO, Inc (Fort Meade, MD)
- …system or program + Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for ... they meet security requirements for processing classified information. Perform vulnerability /risk assessment analysis to support certification and accreditation. +… more
- Nightwing (MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... will include, but are not limited to: Teach, mentor, and advise senior military personnel on various equipment, technical capabilities and employment Techniques,… more