- Nightwing (Springfield, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a Mechanical Engineer for our… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …ISSMs, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered and ensure process is in place for authorized users ... to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO. * Ensure that all DoD IS cybersecurity-related documentation is current and accessible to properly authorized individuals. * Develop procedures to ensure system… more
- First Division Consulting (Dahlgren, VA)
- …management, including firewall configurations, network security tools, and vulnerability mitigation. + Conduct troubleshooting, performance tuning, and resource ... allocation to optimize system functionality. + Implement and monitor TCP/IP network protocols and security measures to protect sensitive information. + Collaborate with IT and cybersecurity teams to enhance system security and defense strategies. + Maintain… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …as part of a team. Desired Experience + Eight (8+) years in vulnerability management & penetration-testing corrective actions. + Eight (8+) years supporting DoD ... defensive cyber operations: system protection, incident handling, reporting, recovery. Physical Demands + Must be able to lift 25 pounds on occasion. + Must be able to stand and walk for prolonged period amounts of time. + Must be able to twist, bend, and… more
- ManTech (Herndon, VA)
- …solutions across classified and unclassified environments. + Perform risk assessments, vulnerability scans, and system hardening in compliance with NIST 800-53 and ... RMF. + Support the preparation and submission of security documentation for Authority to Develop (ATD) and Authority to Operate (ATO) under IC guidelines. + Collaborate with system owners, ISSOs, ISSEs, ISSMs, engineers, and auditors during security… more
- Applied Research Associates, Inc. (Reston, VA)
- …experience supporting reverse engineering, threat analysis, and vulnerability /survivability assessments of WMD-related facilities, processes, and infrastructure ... (to include underground facilities) + Experience with commercial software for engineering and materials characterization and analysis + A working familiarity with other facility and building infrastructure to include power, HVAC, water treatment,… more
- Amazon (Herndon, VA)
- …will: * Drive security findings, research mitigations, and analyze potential security vulnerability related information from a variety of sources to remediate root ... cause. * Manage high security events, communicate risks to AWS stakeholders, and escalate to drive mitigation. * Utilize security mindset and judgment to assess security risks across the organization and escalate accordingly. * Create innovative solutions to… more
- Trellix (Richmond, VA)
- …routines, WFP, and driver development). + Hands-on experience with vulnerability research, including fuzzing, binary diffing, mitigation bypass, and exploitation. ... + Demonstrated experience designing and delivering detection logic across multiple OSs (Windows/macOS/Linux) in a production EDR context. + Experience with applying machine learning techniques to cybersecurity problems. + Experience leading complex… more
- The MITRE Corporation (Mclean, VA)
- …incident response, secure system design, integration of security controls, vulnerability management, adherence to cybersecurity frameworks and standards (eg, NIST, ... ISO 27001), and lifecycle management for complex systems. + Industrial Security: Applying knowledge of the National Industrial Security Program Operating Manual (NISPOM) and managing Controlled Unclassified Information (CUI). +… more
- M. C. Dean (Chantilly, VA)
- …as a whole + Requires an understanding of Windows patching and vulnerability remediation with ATO processes + Requires advanced knowledge of Windows active ... directory hierarchy and implementation. + Strong oral, written and presentation skills + Familiarization with Visio, PowerPoint, and other Office applications **What we offer:** + A collaborative team inspired by the way engineering and innovation enhance… more