- SimIS Inc. (Norfolk, VA)
- …Implement and maintain automated tools and scripts to perform security audits, vulnerability scanning, and other security tasks. + Work closely with development and ... operations teams to ensure security is a shared responsibility and to foster a culture of security awareness. + Continuously monitor systems for security vulnerabilities and proactively mitigate risks and potential breaches. + Verify that software and… more
- Guidehouse (Chantilly, VA)
- …such as system security plans, SOPs, audit logs, configuration scans, and vulnerability scans + Evaluating the implementation and effectiveness of IT controls using ... provided artifacts against federal requirements, industry guidance, and leading best practices + Documenting the results of IT controls testing in a consistent and high-quality manner that would allow others to review and understand the results + Summarizing… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …ISSMs, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered and ensure process is in place for authorized users ... to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO. * Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. * Develop procedures to ensure system… more
- IT Concepts (Springfield, VA)
- …Identity and Access Management integration. + Support information assurance vulnerability alerts and manage relational databases. + Enhance customer service ... through web-based solutions and automate business processes. + Create and troubleshoot workflows, forms, and data visualization applications. + Coordinate updates, security patches, and provide root cause analysis for issues. + Conduct testing prior to… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. We're looking for a mission-driven **Senior Network… more
- IBM (Alexandria, VA)
- …qualifications: . History of presenting at security conferences . Track record in vulnerability research and CVE assignments . Knowledge of Windows APIs . Knowledge ... of EDR detection capabilities such as Carbon Black/Crowdstrike, etc. and associated evasion techniques for behavioral based alerting . Demonstrated exploit, payload, or attack framework development experience . Expert level skills in one of the following:… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Nightwing is seeking a talented Deputy Program Manager to… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The Tech Ops Officer will support the establishment of a… more
- Anywhere Real Estate (Virginia Beach, VA)
- …Knowledge of Splunk and writing SPL. + Experience in Vulnerability Assessment, IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet analysis, ... Log analysis, understanding of IT standards, including but not limited to the OSI model, and the methods of exploiting those standards. + Knowledge of Information Security products and systems (Forensics toolkits, EDR, IDPS, HIPS, SIEM, etc.) + Extensive… more
- Steampunk (Mclean, VA)
- …FISMA, FIPS, and NIST guidelines + Knowledge and experience with the vulnerability scanning execution, assessment, and analysis + Knowledge and experience with ... information security and assurance principles (eg, Defense-in-depth) and associated supporting technologies + Knowledge and experience with application security, database security, and network security + Knowledge and experience with the implementation of the… more