- Amentum (Fort Meade, MD)
- …meet security requirements for processing classified information. + Performs vulnerability /risk assessment analysis to support certification and accreditation. ... and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements… more
- COMSO, Inc (Fort Meade, MD)
- …they meet security requirements for processing classified information. Perform vulnerability /risk assessment analysis to support certification and accreditation. ... and review documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …they meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and ... and reviews documentation to include System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements… more
- Zantech (Aberdeen Proving Ground, MD)
- …+ Cybersecurity frameworks + FISMA + ATO processes + Vulnerability management assessment Preferred Certifications/Education: + Bachelor's degree ... in Cybersecurity, Information Technology, or related field CISSP + Security+ + RMF certifications + Security management training Required Security Clearance: + US Citizenship and the ability to obtain and maintain an active DoD Secret or higher clearance, per… more
- BAE Systems (Fort Meade, MD)
- …all security requirements for processing classified information. + Perform vulnerability /risk assessment analysis to support certification and accreditation. ... + Provides configuration management (CM) for information system security software, hardware, and firmware. + Review security documentation to evaluate changes to system and assesses the security impact of those changes. + Experience in preparing reports such… more
- Zantech (Aberdeen Proving Ground, MD)
- …CPI Assessments + Facilitate program protection teams in Threat Product Integration, Vulnerability Analysis, Risk Assessment + Conduct technical reviews of ... + Supply chain management + Security classification + Risk assessment Preferred Certifications/Education: + Bachelor's degree in Engineering, Security Management,… more
- Defense Information Systems Agency (Fort Meade, MD)
- …and shortcomings within the structure. Identify the principles and techniques of vulnerability and threat assessment , mission and function analysis, readiness ... plan design and development to address and resolve complex and time-sensitive problems associated with DCO and DCO-IDM. Requirements Conditions of Employment Qualifications In order to qualify for this position, you must meet the requirements described below.… more
- Leidos (Odenton, MD)
- …network security, ports/protocols, firewalls, and boundary protection + Experience in vulnerability management and assessment + Understanding of network ... architectures, LAN/WAN, TCP/IP, routing, and switching + Strong understanding of NIST 800-53, 8551.01, DISA security policies, and compliance monitoring + Excellent written and verbal communication for technical documentation and stakeholder engagement… more
- Tactibit Technologies LLC (Suitland, MD)
- …solutions on federal government, especially NOAA, information systems + Experience with vulnerability scanning and assessment tools such as Tenable Nessus + ... Experience supporting virtual server environments using VMware hypervisors and tools + Other useful skills and experience such as network administration or programming to assist with cross-team collaboration + Experience with Federal government environments… more
- SAIC (Bethesda, MD)
- …of security principles and best practices, including threat modeling, risk assessment , and vulnerability management. + Proficiency with DevOps tools ... implement security best practices and standards. + Conduct security assessments, vulnerability analysis, and penetration testing to identify and mitigate security… more