- Bowman (Reston, VA)
- …leadership across all major security domains, including endpoint security, vulnerability management, infrastructure security, cloud security, logging and detection, ... technical security operations, including endpoint security (EDR/XDR & MDM), vulnerability management, logging and detection (SIEM, SOAR, threat intelligence, UEBA,… more
- General Dynamics Information Technology (Fairfax, VA)
- …Integrate IT Security Office approved-automated security controls, orchestrating vulnerability management, administering policy compliance, and providing continuous ... metrics reports (example: deployment frequency, mean time to resolution, vulnerability remediation time) to demonstrate effectiveness and drive improvement… more
- Oracle (Richmond, VA)
- …more of the following: risk management; regulatory compliance; threat and vulnerability management; incident management and response; security policy development and ... in industry forums monitoring developments in regulatory compliance. Threat and Vulnerability Management: Brings advanced level skills to research, evaluate, track,… more
- V2X (Ashland, VA)
- …Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- V2X (Ashland, VA)
- …+ Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... + Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- Deloitte (Richmond, VA)
- …RMF Step 2 and RMF Step 4. * Identify, evaluate, and analyze vulnerability findings using Assured Compliance Assessment Solution (ACAS). * Conduct Security Content ... and Cybersecurity engineering or Operational Technology Systems * Experience in vulnerability scanning, system hardening and applying STIGs/SRGs Ability to be… more
- V2X (Ashland, VA)
- …Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test ... Technical Implementation Guide (STIG) and Security Requirements Guides (SRG). + Ongoing Vulnerability Monitoring and scanning. + Set up, operate and maintain a test… more
- Chenega Corporation (Oakton, VA)
- …requirements. + Enhance IR workflows with automated threat intelligence, vulnerability data, and detection signals. + Troubleshoot automation failures, workflow ... (EDR, SIEM, firewalls, TIPs, IAM, cloud security). + Strong understanding of vulnerability requirements, system STIGing, RMF, and ATO life cycle best practices. +… more
- Lockheed Martin (Herndon, VA)
- …leverage your knowledge of OS security features, reverse engineering, vulnerability analysis, networking, firmware, kernel\-level development, OS platform internals, ... testing, analysis and debugging supporting CNO/CNE\. \- Experience in vulnerability research and applying various analysis techniques \- Experience in… more
- SAIC (Arlington, VA)
- …+ Implement comprehensive security platform utilizing Splunk, Trellix, and Tenable vulnerability management to optimize security operations and vulnerability ... remediation across hybrid cloud environments + Design and optimize security architecture for Azure Stack Hub (ASH), integrating security policies and compliance requirements to enable secure development environments + Provide expert Assessment & Authorization… more
Recent Jobs
-
Nuclear Medicine Technologist
- HCA Healthcare (Wichita, KS)
-
Assistant Professor of Music
- SUNY Geneseo (Geneseo, NY)
-
Telecom Project Manager - DAS - State College
- Amentum (Oaks, PA)
-
Network Development Engineer, Amazon Leo
- Amazon (Redmond, WA)