- KBR (Norfolk, VA)
- …classified and unclassified environments, and include supporting accreditation, vulnerability management, and incident response. Security Specialists work closely ... and system boundaries. + Participate in A&A meetings, assist in vulnerability mitigation, and support system testing. Basic Qualifications: + Education: Bachelor's… more
- Imagine One Technology & Management (Dahlgren, VA)
- …The **Security Engineers** will be expected to: + Author DoD Cybersecurity Assessment and Authorization artifacts. + Document a system from a Cybersecurity ... and specifications to meet DoD security policies. + Perform vulnerability tests as Red Team and Blue Team using...Team and Blue Team using manual techniques, Assured Compliance Assessment Solution (ACAS) and other similar and appropriate IA… more
- Tau Six (Chantilly, VA)
- …Security Control Assessor (SCA) will conduct and document a comprehensive assessment of the management, operational, and technical security controls employed within ... effectiveness through documentation review, inspections, testing and interviews. Provide an assessment of the severity of weakness or deficiencies and recommend… more
- Guidehouse (Reston, VA)
- …availability of the information on a system. The SCA conducts a comprehensive assessment of the security controls employed within or inherited by an Information ... Body of Evidence (BoE), composed of the System Security Plan (SSP), Security Assessment Report (SAR), Plan of Action and Milestones (POA&M), and draft Authorization… more
- St. George Tanaq Corporation (Richmond, VA)
- …System categorization; Security control selection and implementation; Security assessment preparation; POA&M tracking and remediation; Continuous Monitoring ... and prepare system documentation including: System Security Plan (SSP); Security Assessment Report (SAR); Risk Assessment Reports (RAR); Incident Response… more
- BOOZ, ALLEN & HAMILTON, INC. (Arlington, VA)
- …cycle. Conduct hands-on validation and verification of system security hardening, vulnerability management and analysis, and audit log review by applying technical ... of moderate scope and complexity. Support the development and maintenance of Assessment and Authorization documentation such as the System Security Plan (SSP),… more
- M. C. Dean (Vienna, VA)
- …data + Assessment , mitigation, and closure of network vulnerabilities and vulnerability management eMASS + Establishing, managing, and tracking of Plan of Action ... and verification of documentation necessary to complete the DoD RMF assessment and authorization process + Conduct ICS/SCADA system inventories following DoD… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... CI/CD pipeline and the continuous automated/enhanced assessments or O&M of vulnerability scan tools + Facilitates meetings, analyze authorization documents and… more
- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …limited to, Platform Information Technology (PIT) designation requests, PIT Risk Assessment requests, DoD IA Certification and Accreditation Process (DIACAP) plans + ... and Standard Operating Procedures (SOPs) + Coordinating host and network vulnerability assessments with system administrators and developing strategies to mitigate… more
- TekSynap (Arlington, VA)
- …standard operating procedures (SOPs) for security tool administration. + Vulnerability Management & System Hardening: + Conduct technical security assessments ... of computing environments to identify points of vulnerability and recommend mitigation strategies. + Implement Security Technical Implementation Guides (STIGs) on… more