- BigBear.ai (Columbia, MD)
- …(both x86 and x64), PowerShell, Perl, C#, and Rust. + Experience with Vulnerability Research and Exploit development. + Knowledge of end-to-end SIGINT collection and ... analysis systems. + Experience with production CNO capabilities and operations. About BigBear.ai BigBear.ai is a leading provider of AI-powered decision intelligence solutions for national security, supply chain management, and digital identity. Customers and… more
- Belay Technologies (Fort Meade, MD)
- …SW development methodologies + Knowledge of application and security testing, vulnerability management and tracking + Understanding of Risk Management Framework ... (RMF) + Demonstrated engineering experience on programs with requirements, functional analysis, and allocation, conducting system requirement reviews, developing CONOPS and system architectures + Strong verbal and written communication skills + Experience in… more
- Oracle (Annapolis, MD)
- …Maintain secure development practices: signed artifacts, change control, auditability, vulnerability management, and compliance with Oracle policies. Scope and ... ownership + Domain ownership within NOS (eg, datapath feature area, on-box telemetry, or a control plane agent), not the entire program. + Operates with an M5+ manager/architect for strategy; focuses on execution excellence, team health, and local technical… more
- Nightwing (Annapolis Junction, MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Network Engineering - Nightwing** Nightwing is seeking a… more
- General Dynamics Information Technology (Hanover, MD)
- …real time operating systems. you'll be involved in Protocol Analysis, Vulnerability Assessment, Security Research, Rapid Prototyping of proof of concept ... capabilities. it's your chance to step up to the challenge and prove you're ready to lead the world. What you'll experience: - Technologies that aren't just top-notch, they're often top-secret - A team of bold thinkers committed to exploring what's next -… more
- Guidehouse (Bethesda, MD)
- …and SIEMs. + Apply industry-standard and NIH-mandated security measures, conduct vulnerability assessments, and ensure compliance with NIST, CIS, and other ... frameworks. + Automate deployment workflows using tools like Ansible, Terraform, and Packer. + Collaborate with vendors, researchers, and internal teams for upgrades, lifecycle management, and solution transitions. + Lead quarterly patch cycles and coordinate… more
- ASM Research, An Accenture Federal Services Company (Germantown, MD)
- …+ Hands-on expertise with SIEM, IDS/IPS, EDR, DLP, ICAM, CDM, and vulnerability scanning tools. + Experience with security control / management, compliance and ... audit support + Familiarity with DOE cybersecurity policies, FISMA, NIST 800-53, and federal directives. + Experience supporting risk management and certification/accreditation processes. + Certifications such as Security+, CySA+, CEH, or equivalent. **Other… more
- Link Solutions Inc (Aberdeen Proving Ground, MD)
- …+ Design and maintain architecture frameworks. + Conduct comprehensive risk and vulnerability assessments to identify and mitigate risks. + Manage Plans of Action ... & Milestones (POA&Ms) to track and remediate identified vulnerabilities. + Ensure continuous compliance with Government (eg, NIST, DoD) and industry standards. + Develop and implement cybersecurity strategies and policies aligned with the organization's… more
- Guidehouse (Bethesda, MD)
- …efficiency. + Advanced use of SIEM tools (Splunk, ELK), IDS/IPS, and vulnerability . The annual salary range for this position is $56,000.00-$94,000.00. Compensation ... decisions depend on a wide range of factors, including but not limited to skill sets, experience and training, security clearances, licensure and certifications, and other business and organizational needs. **What We Offer:** Guidehouse offers a comprehensive,… more
- CACI International (Frederick, MD)
- …system hardening across Windows/Linux environments. + Assessment & Remediation - Conduct vulnerability scans using tools like Nessus, ACAS, and SCAP. Analyze scan ... results and manage remediation efforts to reduce risk. + Authorization Support - Support the Assessment & Authorization (A&A) process to obtain and sustain ATOs. Manage XACTA data requirements and ensure alignment with DIA RMF processes. + Continuous… more