- Leidos (Annapolis Junction, MD)
- **Description** **Leidos** has a new and exciting opportunity for a ** Senior Linux Systems Administrator** in our **National Security Sector's (NSS) Cyber & ... latency; setting up firewalls. + Responsible for secure infrastructure and vulnerability corrections, data security, compliance, and backups and recovery. Maintain… more
- Leidos (Annapolis Junction, MD)
- **Description** **Leidos** has a new and exciting opportunity for a ** Senior Network Engineer** in our **National Security Sector's (NSS) Cyber & Analytics Business ... with computer or information systems design/development, programming, information/Cyber/Network Security, vulnerability analysis, penetration testing, computer forensics, information assurance and… more
- FirstEnergy (MD)
- …visits for outside vendors + Assist in the annual onsite CIP cyber vulnerability assessments + Provide technical support to the substation groups for regulatory ... commitments, specifically NERC requirements PRC-005, PRC-012, CIP, and state requirements. Including: + Assist field personnel with NERC PRC-005 documentation requirements + Provide ad-hoc training to new personnel on NERC compliance responsibilities +… more
- Marriott (Bethesda, MD)
- …Expertise in various ServiceNow capabilities, including GRC/IRM, Issue Management, Vulnerability Response Management, Security Incident Response (SIR), ITSM, ITAM, ... ITOM, and ITIL frameworks. Exposure to Advanced Risk Module is added advantage. . Experience with ServiceNow integrations using REST/SOAP and MID Servers . Experience with JavaScript, Glide API, HTML, and CSS . Familiarity with CMDB and Discovery. . Experience… more
- Belay Technologies (Fort Meade, MD)
- …device attributes and automate mobile device functions. + Experience performing vulnerability research and protocol analysis (network traffic, OS events). + ... Knowledge of end-to-end SIGINT collection and analysis systems. + Experience with production CNO capabilities and operations. + Experience with additional programming languages (C/C++) Perks and Benefits: + 8 weeks paid leave - 4 weeks of personal leave, 3… more
- Lumen (Annapolis, MD)
- …identify and design solutions for issues involving: new features, interoperability, vulnerability , system limits and constraints facing the platforms and products. ... In addition, engineers are responsible to evaluate current capabilities and predict future needs, then work with internal stakeholders, vendors and peers to anticipate, define, and pursue these capabilities. A successful engineer is a strong communicator and… more
- Vexterra Group (Bethesda, MD)
- …digital media devices. + Conduct reverse engineering, failure analysis, and vulnerability analysis of hardware to identify exploitation opportunities + Modify ... hardware to either enable forensic analysis of the media or to change the functionality of the hardware for desired purposes + Perform inspection, imaging, decapsulation, deprocessing, and other activities related to hardware reverse engineering and… more
- Insight Global (Bethesda, MD)
- …Doing maintenance work with core team. Updating versions of Node, Go and secruoty vulnerability work. Might pick up backlog of cart and checkout team as well Looking ... for manuel, alexis and Daniel, Diego Collaborate with cross-functional teams including product managers, backend engineers, test automation engineers, UX designers, and Scrum Masters to continuously enhance customer experience. Develop and maintain modular… more
- Amentum (Bethesda, MD)
- …DevSecOps), reverse engineering (decompiling, disassembling, debugging), and vulnerability scanning/penetration testing applied to software, hardware, network ... components, security protocols, and cloud-supported technologies. + Demonstrates advanced proficiency with software reverse engineering tools (eg Ghidra, IDA Pro, Binary Ninja, RADARE2) and software and network analysis tools (Kali Linux-associated programs… more
- Amentum (Fort Meade, MD)
- …meet security requirements for processing classified information. + Performs vulnerability /risk assessment analysis to support certification and accreditation. + ... Provides configuration management (CM) for information system security software, hardware, and firmware. + Manages changes to system and assesses the security impact of those changes. + Prepares and reviews documentation to include System Security Plans… more