- General Dynamics Information Technology (Bluemont, VA)
- …automation protocol (SCAP) compliance audits + Adept at utilizing Nessus or other vulnerability scanning tools for vulnerability discovery and analysis + Strong ... in performing technical troubleshooting to resolve hardware and software issues, using a fundamental understanding of TCP/IP networking, DNS/DHCP services, and VLAN configurations to support + Basic understanding of voice over IP (VOIP) implementation to… more
- Bowman (Reston, VA)
- …leadership across all major security domains, including endpoint security, vulnerability management, infrastructure security, cloud security, logging and detection, ... technical security operations, including endpoint security (EDR/XDR & MDM), vulnerability management, logging and detection (SIEM, SOAR, threat intelligence, UEBA,… more
- General Dynamics Information Technology (Fairfax, VA)
- …Integrate IT Security Office approved-automated security controls, orchestrating vulnerability management, administering policy compliance, and providing continuous ... metrics reports (example: deployment frequency, mean time to resolution, vulnerability remediation time) to demonstrate effectiveness and drive improvement… more
- Oracle (Richmond, VA)
- …more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and ... in industry forums monitoring developments in regulatory compliance. Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track,… more
- V2X (Ashland, VA)
- …Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- V2X (Ashland, VA)
- …+ Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... + Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- Deloitte (Richmond, VA)
- …RMF Step 2 and RMF Step 4. * Identify, evaluate, and analyze vulnerability findings using Assured Compliance Assessment Solution (ACAS). * Conduct Security Content ... and Cybersecurity engineering or Operational Technology Systems * Experience in vulnerability scanning, system hardening and applying STIGs/SRGs Ability to be… more
- V2X (Ashland, VA)
- …Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- Chenega Corporation (Oakton, VA)
- …requirements. + Enhance IR workflows with automated threat intelligence, vulnerability data, and detection signals. + Troubleshoot automation failures, workflow ... (EDR, SIEM, firewalls, TIPs, IAM, cloud security). + Strong understanding of vulnerability requirements, system STIGing, RMF, and ATO life cycle best practices. +… more
- Lockheed Martin (Herndon, VA)
- …leverage your knowledge of OS security features, reverse engineering, vulnerability analysis, networking, firmware, kernel\-level development, OS platform internals, ... testing, analysis and debugging supporting CNO/CNE\. \- Experience in vulnerability research and applying various analysis techniques \- Experience in… more
Recent Jobs
-
Research Scientist
- Microsoft Corporation (Redmond, WA)
-
Physician: Neuro Ophthalmology
- St. Luke's Health System (Boise, ID)