- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …video, voice and data, commercial and military) and cyber space operations (eg, computer networks, IA tools use, operations security ). Cyber assessment teams may ... is Q2 of 2026. **Required Qualifications:** + Bachelor's degree or higher in computer science, information technology, cyber security , computer engineering,… more
- General Dynamics Information Technology (Virginia Beach, VA)
- …with Anti-Virus, Intrusion Detection/Protection Systems , Firewalls, Active Directory, Vulnerability Assessment tools and other security tools found in ... into opportunity. And our work depends on a **CYBER SECURITY Manager** joining our team to support Navy Enterprise...a dispersed group of networks + **Bachelor's degree in Computer Science** , Information Systems , Software Engineering,… more
- Citizens (Johnston, RI)
- …+ Application Security Tools + Vulnerability tools + Cyber Security Incident Response + Network Intrusion Detection Systems (SourceFire, McAfee, etc.) + ... level individual contributor role on the Cyber Defense - Computer Security Incident Response Team (CSIRT) and...will have responsibility for one or more of the security systems aligned with their specific function,… more
- TP-Link North America, Inc. (Irvine, CA)
- …a strong technical foundation, including proficiency in developing custom cloud security tools, advanced vulnerability discovery, and system architecture ... alignment with industry best practices. Requirements Qualifications: + Bachelor's degree in Computer Science, Information Security , or a related field (or… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …video, voice and data, commercial and military) and cyber space operations (eg, computer networks, IA tools use, operations security ). Cyber assessment teams may ... in Q2 of 2026. **Required Qualifications:** + Bachelor's degree or higher in computer science, information technology, cyber security , computer engineering,… more
- Chenega Corporation (Colorado Springs, CO)
- …is responsible for managing compliance automation and evidence, including vulnerability scanning, security configuration, and incident response for ... (ACAS) and Nessus. + Apply Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to systems . + Conduct and maintain SIEM… more
- Amentum (Linthicum, MD)
- … security designs. + Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, ... + Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks… more
- Koniag Government Services (Washington, DC)
- …printer refreshes or other changes + Remotely push monthly system patches and security vulnerability updates to workstations using the Government- provided tools ... maintains systems and utility software on server computer systems + Must have expert level... and servers + Ability to provide clients with security vulnerability remediation recommendations and guidance, up… more
- Clark Construction Group, LLC (Mclean, VA)
- …and vulnerability management. Reporting to the Director of Information Security , the Cybersecurity Manager will be responsible for leading advanced incident ... principles + Expert-level knowledge of networking protocols (TCP/IP), operating systems (Windows, Linux), and network/host-based security technologies +… more
- IQVIA (Durham, NC)
- …ITIL, ISO27001 + Experience in working with automated network and application security vulnerability scanners + Commitment in delivering significant value to ... plans + Propose and implement improvements to the landscape of technical security safeguards, including technologies, systems and associated processes and… more