- TekSynap (Virginia Beach, VA)
- …Implementation Guides (STIGs) to ensure secure configurations. + Conduct vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool. ... STIG implementation on operating systems and applications. + Performing vulnerability assessments using ACAS. + Interpreting DoD cybersecurity policies, directives,… more
- TekSynap (Virginia Beach, VA)
- …Technical Implementation Guides (STIGs) to ensure system compliance. + Conduct vulnerability scans using the Assured Compliance Assessment Solution (ACAS) tool. + ... guidelines. + Performing STIG implementations on various platforms. + Running vulnerability assessments using ACAS. + Interpreting and applying DoD security policies… more
- TekSynap (Virginia Beach, VA)
- …STIG implementation on DoD systems and applications. + Conduct comprehensive vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and ... CDS, EMASS, ESS). + STIG application and hardening of systems. + Conducting vulnerability scans and analysis using ACAS. + Patch management and remediation on Linux… more
- TekSynap (VA)
- …network architectures and ensure interoperability with existing systems. + Perform vulnerability and risk analyses across systems and applications throughout the ... communications protocols (eg, TCP/IP, SNMP, IPSec) + Performing network vulnerability analysis and remediation + Developing and deploying network security… more
- Steampunk (Mclean, VA)
- …goals and regulatory requirements. + Conduct regular security assessments, vulnerability assessments, and threat modeling on applications and infrastructure. ... practices, and SDLC integrations. + Proven experience in risk management, vulnerability management, and incident response in a software development environment.… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... CI/CD pipeline and the continuous automated/enhanced assessments or O&M of vulnerability scan tools + Facilitates meetings, analyze authorization documents and… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... + Security Knowledge: Understanding security protocols, threat modeling, and vulnerability assessment. + Experience with Cloud Technologies: Familiarity with cloud… more
- Imagine One Technology & Management (Dahlgren, VA)
- …revise system requirements and specifications to meet DoD security policies. + Perform vulnerability tests as Red Team and Blue Team using manual techniques, Assured ... to specific sets of information systems. + Define an Information Assurance Vulnerability Management (IAVM) Plan. Plan, execute and document results of security… more
- Motion Recruitment Partners (Norfolk, VA)
- …ATO packages + Perform cyber risk assessments, security control implementation, and vulnerability mitigation + Operate within eMASS, Nessus, ACAS, and other DoD ... CISSP, CASP+, or CISM (DoD 8570 compliant) + Experience with eMASS, vulnerability scanning, and system hardening + Knowledge of DevSecOps, cloud security… more
- ManTech (Herndon, VA)
- …events and alerts across enterprise systems. + Conduct security assessments, vulnerability scans, and assist with remediation planning. + Support compliance efforts ... Assist with the implementation and maintenance of security tools (SIEM, vulnerability scanners, endpoint protection). + Analyze threat intelligence feeds and… more