- Amentum (Fort Meade, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... the program life cycle. + Contributes to the security planning, assessment , risk analysis, risk management, certification and awareness activities for system… more
- ARSIEM (Annapolis Junction, MD)
- …security assessments of computing environments to identify points of vulnerability and non-compliance with established. + Cybersecurity standards and regulations, ... system development life cycle. + Contribute to the security planning, assessment , risk analysis, risk management, certification and awareness activities for system… more
- ARSIEM (Columbia, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... the program life cycle. + Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities for system… more
- Themis Insight (Linthicum Heights, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... throughout the program life cycle. Contributes to the security planning, assessment , risk analysis, risk management, certification and awareness activities for… more
- Northrop Grumman (Annapolis Junction, MD)
- …objective to reduce errors, flaws, and weakness that may constitute security vulnerability leading to unacceptable asset loss and consequences + Identify, quantify, ... Cybersecurity Strategies, System Security Plans, Continuous Monitoring Plans, Risk Assessment Report, Security Control Traceability Matrix, Plan Of Actions &… more
- Amentum (Annapolis Junction, MD)
- …design documentation + Guides system development and implementation planning through assessment or preparation of system engineering management plans and system + ... and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis +… more
- KBR (Bethesda, MD)
- …+ Evaluate research initiatives and activities + Develop Risk Assessment documents that identify security, counter-intelligence, and protection requirements + ... Conduct Performer Vulnerability Assessments to include level of foreign ownership/influence, business...every six months + Develop and update Export Control Assessment . Reports include considerations of International Traffic in Arms… more
- Lentech, Inc (Hanover, MD)
- …tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team dedicated to protecting our ... relationships among external systems and architectures. Support security planning, assessment , risk analysis, and risk management Identify overall security… more
- BAE Systems (Annapolis Junction, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established IA standards and regulations, and recommend ... the program life cycle. + Contribute to the security planning, assessment , risk analysis, risk management, certification and awareness activities for system… more
- CACI International (Fort Meade, MD)
- …Perform technical security assessments of computing environments to identify points of vulnerability , and then recommend mitigation strategies for those that do not ... secure networking, computing, and enclave environments + Supported security planning, assessment , risk analysis, and risk management. + Identified overall security… more