- General Dynamics Information Technology (Bethesda, MD)
- …information security groups and organizations. + Possesses experience with communicating vulnerability results and risk posture to senior executives. + Possess a ... broad knowledge of Information Security policies and guidance, as well as the ability to assist in researching, evaluating, and developing relevant security policies and guidance **WHAT YOU'LL NEED TO SUCCEED:** + **Education** : Bachelors (Computer… more
- TISTA Science and Technology (Rockville, MD)
- …performance. + Apply security best practices including firewalls, access controls, vulnerability scans, and compliance with NIST/FISMA standards. + Collaborate with ... developers, architects, and business stakeholders to deliver secure, resilient, and scalable cloud solutions. Qualifications + 5+ years in DevOps/Infrastructure Engineering + 7+ years scripting/coding (Python, PowerShell, Ansible, etc.). + Deep expertise in… more
- US Marine Corps (Fort Meade, MD)
- …systems (OS). You will direct scans and analysis of network vulnerability , configuration analysis, and network architecture analysis. You will apply current ... software and methodologies for active defense and system hardening. You will analyze and define security requirements for wireless applications and structure, including vulnerabilities in various types of wireless applications. Requirements Conditions of… more
- Nightwing (Annapolis Junction, MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Job Summary** System Engineer SE at Nightwing CODEX… more
- System One (Towson, MD)
- …lifecycles, conduct access reviews, perform hardening, and lead vulnerability management. + Disaster Recovery (DR/BCP): Define backup policies, ... execute restore tests, maintain failover runbooks, and report on RTO/RPO metrics. + Release & Automation: Establish environment readiness gates, conduct rollback rehearsals, and leverage PowerShell, Azure CLI, Bicep, or Terraform for task automation. +… more
- National Security Agency/Central Security Service (Fort Meade, MD)
- …engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, ... cybersecurity, systems engineering and/or network and system administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis course) will be considered towards the relevant experience requirement (ie, 24-week JCAC course… more
- CACI International (Annapolis Junction, MD)
- …to meet requirements for processing classified information, including conducting vulnerability and risk assessments for certification and accreditation. * Manage ... configuration control for system security software, hardware, and firmware, assessing and documenting the security impact of system changes. * Prepare, review, and support security documentation and authorization activities, including SSPs, Risk Assessments,… more
- KBR (Bethesda, MD)
- …providing recommendations to address issues and shortfalls in security, vulnerability , confidentiality, integrity, and availability + Experience providing systems ... engineering support to evaluate utility and demand for capabilities, systems, and services and suggest modifications + Demonstrated experience executing and managing end-use requirements gathering and curation activities for Information Technology (IT) systems… more
- Army National Guard Units (Baltimore, MD)
- …Army Regulations internal control systems, initiates, accomplishes and maintains vulnerability assessments, internal control reviews, and, as applicable, proponent ... checklists. Ensures that potential problems are resolved and that adequate internal controls are implemented. Takes action necessary to minimize inherent risk and correct internal control inadequacies. Monitors State ARNG federally funded Readiness Centers and… more
- General Dynamics Information Technology (Bethesda, MD)
- …Ensures system patching and configuration security and compliance with vulnerability remediation requirements. **Required Qualifications:** + Bachelor's degree in ... IT, computer science, or a related field. + Minimum of 8 years of experience managing large-scale storage solutions and data protection practices. + Experience with scientific data management and cloud storage. + Experience with DELL/EMC Unity and Isilon… more