- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a motivated Facilities Building… more
- SAP (Herndon, VA)
- …for service management, scripting (Bash/Shell), permissions, and patching based on vulnerability scans. + Create, maintain, and enhance technical documentation using ... Markdown, MS Word, and PowerPoint for internal distribution and release planning. + Collaborate with infrastructure teams on VMware and Azure setups to mimic high-side/low-side deployment scenarios. Required Skills & Experience + Expert-level Java development,… more
- EPS Corporation (Dahlgren, VA)
- …will possess a strong background in system security engineering, vulnerability management, and risk assessment, with hands-on experience supporting accreditation ... and audit processes. Requirements + Performvulnerability assessmentsandrisk analyseson networked systems, applications, and devices to ensure compliance with DoD cybersecurity standards. + Conductvirus and malware scans, identifying and mitigating software… more
- Koniag Government Services (Arlington, VA)
- …to end to ensure timely completion within established SLAs. + Analyze vulnerability , scan results from various tools and prioritize remediation efforts based on ... severity and age. + Lead and collaborate with EX/IT teams on resolving outstanding vulnerabilities requiring deep hands-on technical expertise to remediate complex patching issues. + Report and brief on status of activities. + Stay informed about the latest… more
- Zscaler (Mclean, VA)
- …AWS ECS and Kubernetes + Experience in monitoring activities such as vulnerability scanning, patch management, and reporting, with expertise in virtualization, web ... security, and networking protocols **What Will Make You Stand Out (Preferred Qualifications)** + Experience working within air-gapped and classified environments managing monthly monitoring programs + Familiarity with High/Moderate FedRAMP authorization levels… more
- CACI International (Springfield, VA)
- …and maintaining applications hosted in a Linux environment + Experience with vulnerability management applications, such as Nessus or ACAS This position is ... contingent on funding and may not be filled immediately. However, this position is representative of positions within CACI that are consistently available. Individuals who apply may also be considered for other positions at CACI. ** ** **What You Can Expect:**… more
- ARSIEM (Arlington, VA)
- …in the system of record consistently and professionally. + Threat and vulnerability management to recognize and categorize types of vulnerabilities, threat actors, ... and different operational threat environments, and associated attacks (MITRE ATT&CK framework). + Knowledgeable of network security monitoring and/or security operations analysis, system administration, operating system hardening, cyber hygiene techniques, and… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing has an immediate need for SIGINT Operators in the… more
- Optiv (Richmond, VA)
- …industry groups, delivering talks, writing technical and industry-specific blogs, vulnerability research, industry PR interviews, and/or contributing to security ... publications. * Collaborate as a technical expert with Practice Managers, Marketing, and Sales support organizations to develop new go-to-market solutions. * Lead client workshops, assessments, and executive briefings, often in front of both technical and… more
- TekSynap (VA)
- …DoD and federal cybersecurity requirements. + Supports continuous monitoring, vulnerability management, and audit readiness efforts within cloud-hosted environments. ... + Provides expert guidance on secure modern computing paradigms, including hybrid, cloud-native microservices, edge computing, and Internet of Things (IoT) implementations. + Contributes to the development of cloud architectures, security baselines, and… more