- Leidos (Linthicum Heights, MD)
- …in relevant security-related meetings and reviews in an effort to translate vulnerability knowledge into guidance to prevent and/or manage risk. Clearly document ... security deficiencies found in the evaluation of artifacts and documents. Recommend requirement clarification and process/template improvement to mitigate security concerns. **Qualifications:** Fourteen (14) years of System Engineering experience Bachelor's… more
- DarkStar Intelligence LLC (Fort Meade, MD)
- …or Go + Training/Certification: Experience with secure development practices, vulnerability mitigation, and CI/CD pipelines + Familiarity with Agile/DevSecOps ... practices and automated testing frameworks Desired Qualifications + Prior experience with cyber tool development for USCYBERCOM, MARFORCYBER, or other DoD/IC customers + Exposure to reverse engineering, fuzzing, or exploitation frameworks + Knowledge of… more
- CACI International (Annapolis Junction, MD)
- …meet stringent security requirements for processing classified information, performing vulnerability and risk assessments to support security authorization, and ... managing configuration management (CM) processes for information systems security software, hardware, and firmware. The candidate will also play a key role in assessing the security impact of system changes and ensuring that all security modifications are… more
- Nightwing (Annapolis Junction, MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Position Description** At Nightwing CODEX, a software… more
- Leidos (Suitland, MD)
- …NAT, GRE, IPSEC). + Experience with packet capture, traffic analysis, and vulnerability remediation. + Strong understanding of the OSI model and multi‑protocol ... routing (VRF, VPN, EIGRP, BGP, OSPF, VPLS). **Why Join Leidos?** At Leidos, this isn't just another support role-it's a chance to **shape the future of national security operations** . You'll: + Work at the heart of critical intelligence missions. + Develop… more
- Sierra Nevada Company, LLC (Hagerstown, MD)
- …forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. You'll ... research, evaluate, and recommend new security tools, techniques, and technologies in alignment with our IT security strategy and introduce them to the enterprise. The ISR (Intelligence, Surveillance & Reconnaissance), Aviation, and Security (IAS) business… more
- CACI International (Hanover, MD)
- …and infrastructure deployment tools. + Ability to perform system startup & shutdown, vulnerability scans, and patch management on Linux and Windows. + Skilled in ... creating/updating documentation and diagrams (System Security Plans, Security CONOPS, FAQs, How To's). + Maintain current documentation with minimal supervision. + Excellent time management skills for multitasking and prioritization. **Ready to Make a… more
- Oracle (Annapolis, MD)
- …things like patching the Linux kernels to take care of a security vulnerability ). Developing systems for monitoring and getting telemetry into the service's runtime ... characteristics and being able to take actions on the telemetry data is a part of the charter. https://www.oracle.com/big-data/big-data-service/ We are interested in senior engineers with expertise and passion for solving difficult problems in distributed… more
- CACI International (Annapolis Junction, MD)
- …effectiveness in protecting classified information. The candidate will also manage vulnerability and risk assessments, as well as contribute to security ... authorization activities, including preparation and review of critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, and Certification and Accreditation (C&A) packages. The successful candidate will oversee configuration… more
- Amentum (Columbia, MD)
- …meet security requirements for processing classified information. * Perform vulnerability /risk assessment analysis to support security authorization. * Provide ... configuration management (CM) for information systems security software, hardware, and firmware. * Manage changes to system and assess the security impact of those changes. * Prepare and review documentation to include System Security Plans (SSPs), Risk… more