- EAB (Richmond, VA)
- …advancement. We work with each partner differently, tailoring our portfolio of research , technology, and marketing and enrollment solutions to meet the unique needs ... etc.) + AWS native tooling + CSPM tools (Wiz, Orca, etc.) + Vulnerability management scanners (Nessus, Rapid7, etc.) + OneTrust cookie compliance and DSAR automation… more
- Noblis (Arlington, VA)
- …and implementation of strategy doctrine, policy, guidance, programs, projects, operational research , analysis, and testing relating to the AF CWMD Range of ... general categories of analytic quantitative assessment, including: + Threat and Vulnerability Assessments, + Basic Challenge Sources, + Attack Characterization, +… more
- Nightwing (Springfield, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a Multi-disciplinary… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing Security is seeking a… more
- Amazon (Herndon, VA)
- …specifically, the SOC Support Engineer will: * Drive security findings, research mitigations, and analyze potential security vulnerability related information ... from a variety of sources to remediate root cause. * Exercise judgment in assessing security risks, prioritizing incidents, and determining appropriate escalation paths through established channels * Utilize security mindset to respond to security tickets… more
- Global Resource Solutions (Arlington, VA)
- …Program Implementation Guide (JSIG) authorization process Provides expert support, research and analysis of exceptionally complex problems, and processes relating ... servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management and configuration, Scripting, BMC… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing Intelligence is looking to fill… more
- NTT DATA North America (Newport News, VA)
- …ENS, and ePO with McAfee Application control and DLP, and Tenable.sc. + Research and identify potential vulnerabilities and risks within our systems, and propose ... in a SOC (Security Operations Center) environment + Strong understanding of vulnerability management and threat landscape + Familiarity with RMF 800-53 and DISA… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing's Cloud DevOps Engineers help… more
- Amazon (Herndon, VA)
- …More specifically, the Support Engineer will: * Drive security findings, research mitigations, and analyze potential security vulnerability related information ... from a variety of sources to remediate root cause. * Manage high security events, communicate risks to AWS stakeholders, and escalate to drive mitigation. * Utilize security mindset and judgment to assess security risks across the organization and escalate… more