- General Dynamics Information Technology (MD)
- …50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud , Cyber and application development. Together with our clients, ... to Obtain:** Secret **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity,Information Security,Information Technology… more
- CACI International (Chantilly, VA)
- …Directory * Identify weaknesses and recommend mitigation strategies * Draft assessment reports and memoranda regarding vulnerability assessments, risk ... applications pen-testing experience. As a functional member of a cyber red team, you will look for creative ways...evaluations and possible remedies * Develop and provide assessment briefings **Qualifications:** _Required:_ * Must have an active… more
- General Dynamics Information Technology (Bethesda, MD)
- …50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud , Cyber and application development. Together with our clients, ... Top Secret SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Amazon Web Services (AWS),Plan of Action… more
- L3Harris (Greenville, TX)
- …Information Security Manager (CISM), Certified Information Security Auditor (CISA), Certified Cyber Security Architect (CCSA), Certificate of Cloud Security ... technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job...cycle of system that will allow for the security assessment and authorization of the system of interest. Works… more
- INTECON (Bellevue, NE)
- …support the 557th Weather Wing (WW) at Offutt Air Force Base. The Cyber Analyst will provide expert-level support in the development, tailoring, and sustainment of ... Key Responsibilities: + Advise and assist in the development of Wing and local cyber policy based on USAF and DoD guidance. + Tailor and update existing policies… more
- MUFG (Jersey City, NJ)
- …Governance and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management. + Knowledge of cloud security, AI security, ... ** The AVP for Incident Response Planning and Operations is responsible for cyber security wargaming and incident readiness program. While the focus is the Americas,… more
- Kratos Defense & Security Solutions, Inc. (Colorado Springs, CO)
- …policies, standards, and procedures are established and followed. The ISSM will perform vulnerability and risk assessment analyses to support Assessment & ... policies and procedures such as System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment...captured are as outlined in applicable + Ensure the cyber incident response plan is followed when security incidents… more
- BOOZ, ALLEN & HAMILTON, INC. (San Antonio, TX)
- Penetration Tester, Mid The Opportunity: As a cyber professional, you understand that identifying adversary tactics, techniques, and procedures is essential to ... and experience to shape strategies and help mitigate the most urgent cyber vulnerabilities. Here, you aren't just interpreting reports, you're telling the story… more
- V2X (Springfield, VA)
- …Server 2012 or newer UNIX (Linux (Red Hat), Solaris). . Experience with vulnerability scanners. . Experience with Cloud technologies. . Documented (certificate) ... Security Control Assessor (SCA) will conduct and document a comprehensive assessment of the management, operational, and technical security controls employed within… more
- JPMorgan Chase (Plano, TX)
- …Security Config, secure SDLC, Identity and Access Management. + Deep understanding of cyber risk scenarios for on-prem, SaaS and cloud -based solutions. + ... data. You will focus on the identification, analysis, and management of cyber risks, leveraging your expertise in cybersecurity to strengthen defenses, minimize… more