- NuAxis Innovations (Falls Church, VA)
- …security and operations stakeholders to track remediation activities, such as vulnerability fixes, and ensure sequencing aligns with compliance requirements. + ... Assist with subcontractor coordination when needed; oversee performance, quality, and acceptance of deliverables. **Minimum Qualifications** + PMI certification (PMP required). + Minimum 7 years of project management experience + Demonstrated experience… more
- Northrop Grumman (Mclean, VA)
- …Threat Program + Prior interaction with DCSA during assessments or security vulnerability reviews + Knowledge of insider threat, OPSEC, and program protection ... disciplines + Strong written and verbal communication skills with the ability to brief leadership + Ability to work independently while managing competing priorities + Working knowledge of the ICD standards/documents + Experience with supporting Crisis… more
- ManTech (Springfield, VA)
- …tactical levels. + Provide technical CI expertise and support for vulnerability mitigation, Research and Technology Protection (RTP) initiatives (including CI Threat ... Assessments), and the seamless integration of CI into NGA's Supply Chain Risk Management (SCRM) policies and initiatives. + Participate in and support IC-directed damage assessment task forces for unauthorized disclosures or loss of classified information,… more
- Insight Global (Alexandria, VA)
- …* Implement DevSecOps pipelines with automated security testing and vulnerability remediation. * Assess current security architecture effectiveness through ... evaluation and testing. * Identify existing security gaps and opportunities for improvement. * As needed conduct and support market research to identify existing and emerging business systems that can support future processes * Other responsibilities and… more
- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …various tools such as Assured Compliance Assessment Solution (ACAS)/Nessus vulnerability scanner, Security Technical Implementation Guides (STIGs), and Security ... Requirement Guides (SRGs) related to COTS operating systems, applications, and network infrastructure devices. + Ability to be independently responsible for planning and conducting a project of limited scope or a portion of a large project with diverse… more
- Leidos (Ashburn, VA)
- …media forensic + Monitoring and detection + Incident Response + Vulnerability assessment andpenetration testing + Cyber intelligence analysis + Extensive experience ... analyzing and synthesizing information with other relevant data sources, providing guidance and mentorship to others in cyber threat analysis and operations. + Ability to collaborate with technical staff and customers toidentify, assess, and resolve complex… more
- Sunrise Senior Living (Mclean, VA)
- …for admin operations. + Ensure Defender for Endpoint onboarding, EDR, vulnerability management, and alerting are configured, tuned, and measured; drive remediation ... at scale. + Deploy, configure, and maintain endpoint devices and associated software (Win32/MSIX packages, certificate, Wi-Fi, VPN profiles, browser policies). + Lead Windows Update for Business and Autopatch strategy, update rings, and reporting; coordinate… more
- Washington Metropolitan Area Transit Authority (VA)
- …risk assessments that help protect critical systems and data. Assist in vulnerability management by running scans, analyzing results, and contributing to remediation ... efforts. Work alongside infrastructure engineering teams to monitor and safeguard both IT and OT endpoint devices. This internship is a unique opportunity to gain a broad view of cybersecurity operations while developing specialized skills in areas aligned… more
- Amazon (Arlington, VA)
- …safeguard highly sensitive data. They work hands-on with detection systems and vulnerability analysis tools to respond to potential threats to Amazon systems. SIRT ... Security Engineers are unique individuals prepared to relentlessly resolve security issues by gathering and analyzing event data and conducting root-cause analysis. With your technical expertise, you will be solving security challenges at scale, working to… more
- General Dynamics Information Technology (Fairfax, VA)
- …management. + Security & Compliance: Baseline hardening (CIS/STIGs), vulnerability /patch orchestration, encryption in transit/at rest, secrets management ... (Vault/KMS), least-privilege patterns; evidence generation for RMF ConMon. + Cost & Performance: FinOps fundamentals - commitment management (RIs/SPs/CCAs/Committed Use), autoscaling/scale-to-zero, right-sizing, storage tiering; performance tuning at… more