- BOOZ, ALLEN & HAMILTON, INC. (Norfolk, VA)
- …and network health assessments. + C ond uct and document cybersecurity vulnerability scans using approved tools in compliance with DoD requirements. + Maintain ... accurate network documentation and diagrams. + Lead troubleshooting efforts for escalated network issues. + Collaborate across IT teams to ensure secure, scalable, and compliant network operations. Join us. The world can't wait. You Have: + 5+ years of… more
- US Tech Solutions (Arlington, VA)
- …with evaluation, integration and onboard of security tools such as RASP, WAF, vulnerability scanner results, container analyzers, open source scanning etc is a plus ... - Work with Development, DevOps and Security teams to identify and develop automated security and compliance capabilities in support of DevOps processes. - Define the security rules that needs to be adhered to at a code level in web and mobile applications… more
- NANA Regional Corporation (Ashburn, VA)
- …& Authorization (A&A) process. + Experience reviewing Nessus scans, managing vulnerability mitigation and the information security process in an Enterprise ... environment. + Basic understanding of Enterprise networking concepts. + Ability to work well within a team environment and build reports with government and customer organizations. **Job ID** 2025-20831 **Work Type** On-Site **Company Description** **Work… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking an experienced and cleared Field… more
- RGP (Glen Allen, VA)
- …+ Administer identity/access (RBAC, least privilege), secrets management, patch management, vulnerability scanning, and audit logging. + Partner with Release & ... Compliance and Security Lead for POA&Ms, audit artifacts, and continuous control monitoring. Observability, Performance & SRE Practices + Instrument systems for endtoend observability (metrics, logs, traces), define SLOs/SLIs, and manage alerting. + Perform… more
- BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
- …case management platform and security tools such as SIEM, EDR, vulnerability management platforms, threat intelligence sources, identity systems, and ticketing or ... ITSM platforms. Build and maintain API services, event pipelines, data ingestion jobs, and synchronization services. Implement automated backend workflows to support case routing, enrichment, evidence linkage, and cross-platform data federation. Ensure the… more
- Steampunk (Mclean, VA)
- …experience with three (3) of the four (4) following criteria: + Vulnerability scanning execution, assessment, and analysis + Operating system and network knowledge ... (ie, Local Area Networks [LAN] and Wide Area Networks [WAN]) + Information security and assurance principles (eg, Defense-in-depth) and associated supporting technologies + Application security, database security, and network security + Demonstrated ability to… more
- COLSA Corporation (Quantico, VA)
- …10) Support the development of OPSEC-specific analytical reports to support vulnerability assessments and OPSEC programs. 11) Support the development of trends ... and analysis reports concerning Marine Corps OPSEC posture and maintain currency in awareness of "OPSEC Best Practices" across the service and DOD. 12) Support the development and submission of ad-hoc reports. 13) Support the integration OPSEC into support of… more
- ICF (Arlington, VA)
- …and note-taking. + Coordinate the sharing of cyber threat intelligence and vulnerability information across internal and external stakeholders. + Draft and edit ... notifications and other communications to partners to enhance operational coordination and information-sharing. + Monitor inboxes and other operational channels for partner communications, respond to cyber partner inquiries, coordinate cybersecurity products… more
- CGI Technologies and Solutions, Inc. (Arlington, VA)
- …are established and followed. * Risk Management: Conduct risk assessments, vulnerability analyses, and investigations to identify and mitigate threats and ... vulnerabilities. * Compliance and Authorization: Implement and manage security plans, ensuring information systems comply with government regulations (like the Risk Management Framework - RMF) and maintain Authorization to Operate (ATO) status. *… more