- Parsons Corporation (Linthicum, MD)
- …Ready to be part of a cutting edge growing Cyber Security project that is making a huge impact on the DOD/Intel community? This exciting role is part of a large team ... In a world of possibilities, pursue one with endless opportunities. Imagine Next! At Parsons, you can imagine a career where you thrive, work with exceptional people, and be yourself. Guided by our leadership vision of valuing people, embracing agility, and… more
- Leidos (Annapolis Junction, MD)
- …and latency; setting up firewalls. Responsible for secure infrastructure and vulnerability corrections, data security, compliance, and backups and recovery. Maintain ... SSPs, STE/STN requirements via RMF, Netseer, SEAR logging, patching, IAVMs, McAfee, and UAM. + Responsible for user-level support, including interacting with system-savvy developers and analysts, resolving network, computer, and virtual system issues &… more
- Concurrent Technologies Corporation (Columbia, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... regulations, and recommend mitigation strategies. Validates and verifies system security requirements definitions and analysis and establishes system security designs. Designs, develops, implements and/or integrates IA and security systems and system… more
- General Dynamics Information Technology (Fort Meade, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Producability, etc.) + Establish and follow a ... formal procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces QUALIFICATIONS: Fourteen (14) years experience as a SE in programs and contracts of similar scope, type and complexity is… more
- Northrop Grumman (Baltimore, MD)
- …project status as required for all recurring and non-recurring efforts. + Understand vulnerability and risk mitigation in accordance with RMF & DoD JSIG standards. + ... Work under minimal direction and independently determine and develop approach to solutions. **Basic Qualifications:** + Associate's degree and 7 years of relevant experience, or a Bachelor's degree and 5 years of relevant experience, or a Master's degree and 3… more
- Amentum (Fort Meade, MD)
- …recommendations for the resolution or computer security incidents and vulnerability compliance. * Experience creating and presenting documentation and management ... reports. **Clearance Required:** * TS/SCI with Poly **Minimum Education:** * A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field may be substituted for four (4) years' experience. * DoD 8570.1 compliant IAM Level III… more
- Themis Insight (Laurel, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Producability, etc.) + Establish and follow a ... formal procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces Individual Capabilities/Experience Required: + Fourteen (14) years experience as a SE in programs and contracts of similar scope,… more
- Amentum (Baltimore, MD)
- …Control), and least privilege principles. * Support incident response and vulnerability management processes through root cause analysis, patching, and continuous ... improvement of security posture. * Document and maintain operational runbooks, playbooks, and system diagrams to promote transparency, consistency, and knowledge sharing across the team. * Continuously evaluate and improve automation, monitoring, and security… more
- KBR (Chevy Chase, MD)
- …providing recommendations to address issues and shortfalls in security, vulnerability , confidentiality, integrity, and availability + Experience providing systems ... engineering support to evaluate utility and demand for capabilities, systems, and services and suggest modifications + Demonstrated experience executing and managing end-use requirements gathering and curation activities for Information Technology (IT) systems… more
- Oracle (Annapolis, MD)
- …performance indicators (KPIs) across core security domains, including identity, vulnerability management, incident response, compliance, and product security. + ... Design and deliver dashboards and reports that meet the needs of both technical and executive audiences. + Partner across teams to source, normalize, and validate data from various systems and tools. + Translate complex data into clear insights that support… more