- KBR (Chantilly, VA)
- …guidance to include the Risk Management Framework (RMF) process, and vulnerability assessment and remediation. + Extensive knowledge, experience and expertise using ... a variety of Agile methodologies and acquisition techniques is required. + Knowledge and experience with GEOINT and SIGINT collection platforms is essential. Security Clearance: + Active TS/SCI Polygraph. Belong, Connect and Grow at KBRAt KBR, we are… more
- CoStar Realty Information, Inc. (Arlington, VA)
- …into actionable intelligence for SOC,Detection Engineering,Incident Response, Vulnerability Management, andnon-securitystakeholders. + Design and implementascalable ... CTI platform, integrations, and automation workflows to enhance intelligence collection, enrichment, andprocessing. + Conductdetailed researchonthreat actors, campaigns, malware, and TTPs using frameworks such as MITRE ATT&CKtoidentifyrisk and threats specific… more
- BAE Systems (Herndon, VA)
- …Xacta + Cloud security controls and implementation + STIG compliance and vulnerability management + CISSP + AWS Certified Security Specialty + Microsoft Office365 ... + Experience in one or more software products associated with cyber system engineering for data analytics including SQL security, TANIUM Endpoint Management Software, Powershell, MacAfee, App Blocker, Splunk ITSI. + Experience with one or more software… more
- Node.Digital (Arlington, VA)
- …analyzing, and responding to cyber threats to inform the customer's vulnerability management (VM) efforts. In support of the customer's strategic direction, ... Node.Digital is looking for motivated individuals who can support the development of new and innovative Cyber Threat Intelligence techniques, to be the tip of the spear for VM's threat intelligence capabilities. Responsibilities: * Proactively gather, analyze,… more
- Cipher Tech Solutions (Vienna, VA)
- …embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems via static and/or dynamic tools and ... techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are also part of day-to-day activities. Embedded application design and testing may also be performed for the target platforms.… more
- Insight Global (Reston, VA)
- …of 2 or more of these IT/Security functions; asset management, vulnerability management, identity and access management, network security, and data protection. ... o Leading enterprise IT solution activities from conceptual design to deployment and sustainment o Understanding the data sets or information provided by COTS tools in support of the needs of the organization o Understanding of Cloud Access Security Brokers,… more
- Navy Exchange Services (NEX) (Virginia Beach, VA)
- …team in protecting an organization s systems and data by performing vulnerability assessments monitoring for and responding to security events and helping to ... manage security tools. This role provides hands-on experience in areas like incident response threat research and developing security awareness documentation. Duties and Responsibilities: Interns job duties are specified in the Individual Assignment Plan… more
- BAE Systems (Sterling, VA)
- …audits, compliance, and lifecycle management. + Support security audits and vulnerability assessments by providing system data, implementing remediation actions, and ... maintaining audit-ready configurations. + Execute system changes and upgrades in accordance with program change and configuration management processes. Support & Collaboration + Provide Tier 2 incident response by troubleshooting escalated issues, restoring… more
- Navy Exchange Services (NEX) (Virginia Beach, VA)
- …computing environments through the SSR process to identify points of vulnerability and non-compliance with established Information Assurance (IA) standards and ... regulations - Track FISMA Contingency Plan testing compliance. - Assist CSWF-PM with maintaining and tracking CSWF program compliance. - Perform quarterly audit reviews and reporting. - Expert with compliance and regulatory requirements such as DIACAP, RMF,… more
- KBR (Chantilly, VA)
- …cloud throughout the development lifecycle. + Implement security scanning and vulnerability management processes. + Manage and optimize GitHub repositories and ... workflows. + Collaborate with software development and operations teams to integrate security practices. + Troubleshoot and resolve issues related to pipeline automation and security. + Ensure compliance with security policies and procedures. Minimum… more
Recent Jobs
-
Design and Support Engineer
- Precision Custom Components, LLC (York, PA)
-
Back of House Manager
- Compass Group, North America (New York, NY)