- Parsons Corporation (Linthicum, MD)
- …and DCO (Defensive Cyber Operations) activities. Support assessments of large-scale weapons systems and other national security operations. We seek developers to ... to be part of a cutting edge growing Cyber Security project that is making a huge impact on...Or BS in STEM field (Electrical/ Computer /Software Engineering, Computer Science, Math or Information Systems ) and… more
- Amentum (Columbia, MD)
- … security designs. * Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, ... * Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …video, voice and data, commercial and military) and cyber space operations (eg, computer networks, IA tools use, operations security ). Cyber assessment teams may ... is Q2 of 2026. **Required Qualifications:** + Bachelor's degree or higher in computer science, information technology, cyber security , computer engineering,… more
- Citizens (Johnston, RI)
- …+ Application Security Tools + Vulnerability tools + Cyber Security Incident Response + Network Intrusion Detection Systems (SourceFire, McAfee, etc.) + ... level individual contributor role on the Cyber Defense - Computer Security Incident Response Team (CSIRT) and...will have responsibility for one or more of the security systems aligned with their specific function,… more
- TP-Link North America, Inc. (Irvine, CA)
- …a strong technical foundation, including proficiency in developing custom cloud security tools, advanced vulnerability discovery, and system architecture ... alignment with industry best practices. Requirements Qualifications: + Bachelor's degree in Computer Science, Information Security , or a related field (or… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …video, voice and data, commercial and military) and cyber space operations (eg, computer networks, IA tools use, operations security ). Cyber assessment teams may ... in Q2 of 2026. **Required Qualifications:** + Bachelor's degree or higher in computer science, information technology, cyber security , computer engineering,… more
- Chenega Corporation (Colorado Springs, CO)
- …is responsible for managing compliance automation and evidence, including vulnerability scanning, security configuration, and incident response for ... (ACAS) and Nessus. + Apply Security Technical Implementation Guides (STIGs) and Security Requirements Guides (SRGs) to systems . + Conduct and maintain SIEM… more
- Amentum (Linthicum, MD)
- … security designs. + Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, ... + Enforce the design and implementation of trusted relations among external systems and architectures. Assesses and mitigates system security threats/risks… more
- Koniag Government Services (Washington, DC)
- …printer refreshes or other changes + Remotely push monthly system patches and security vulnerability updates to workstations using the Government- provided tools ... maintains systems and utility software on server computer systems + Must have expert level... and servers + Ability to provide clients with security vulnerability remediation recommendations and guidance, up… more
- Palo Alto Networks (Santa Clara, CA)
- …of the following areas: Endpoint (EDR/XDR), Vulnerability Management, or Cloud Security . You've a systems mindset and are equally comfortable diving into ... and customers **Your Experience** + 5-7 years of experience in Cybersecurity, Vulnerability Management, Endpoint Security , or Cloud Security (CNAPP,… more