- EchoStar (Littleton, CO)
- …of network protocols, operating systems, and security frameworks + Experience with vulnerability assessment and penetration testing tools + Excellent analytical ... teams + Self-motivated and eager to learn, with a strong passion for cyber security + Relevant certifications such as CompTIA Security+, Certified Ethical Hacker… more
- Federal Reserve Bank (Richmond, VA)
- …(FRS), delivers national intrusion detection, incident response, security intelligence, threat assessment , and vulnerability assessment services for the ... weaknesses in the system to improve security posture + Lead covert offensive security assessment activities across all stages of the cyber kill chain. + Drive… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …a leader in big data solution development and deployment, with expertise in cloud -based services, software and systems engineering, cyber capabilities, and data ... protection/classification requirements. The candidate should understand distributed architectures and cloud -based systems for big data applications. Role is hybrid… more
- Huntington Ingalls Industries (San Antonio, TX)
- …a leader in big data solution development and deployment, with expertise in cloud -based services, software and systems engineering, cyber capabilities, and data ... protection/classification requirements. The candidate should understand distributed architectures and cloud -based systems for big data applications. Must be willing… more
- SAIC (Chantilly, VA)
- …to POA&Ms, and performing Continuous Monitoring activities + Ability to interpret vulnerability , risk, and security assessment of hardware and software + ... high-end solutions in systems engineering and integration; enterprise IT, including cloud services; cyber ; software; advanced analytics and simulation; and… more
- MUFG (Tempe, AZ)
- …the behavior of adversaries. **Major Responsibilities** + Perform cybersecurity threat detection, assessment , and mitigation efforts as part of a 24/7 global team + ... security policies **Qualifications** + Bachelor's degree in Information Technology, Cyber Security, Computer Science, or related discipline or equivalent work… more
- Lockheed Martin (Fort Worth, TX)
- …extensive technical expertise and ingenuity\. * Collaborate with program security, cyber management, senior level internal \(i\.e\. Program Managers\) and external ... of the information systems lifecycle\. * Perform security monitoring/auditing, vulnerability risk assessments, assured file transfers, hardware/software configuration management,… more
- Guidehouse (Bethesda, MD)
- **Job Family** **:** IT Cyber Security **Travel Required** **:** Up to 25% **Clearance Required** **:** Ability to Obtain Public Trust **What You Will Do** **:** **. ... (firewalled) team. + Perform interviews, test controls, develop Security Assessment Reports (SARs), and create Plans of Action and...with NIST 800-53 and NIST 800-37. + Experience with cloud systems and SaaS products, and understanding of the… more
- Guidehouse (Bethesda, MD)
- **Job Family** **:** Cyber Consulting **Travel Required** **:** Up to 25% **Clearance Required** **:** Ability to Obtain Public Trust **What You Will Do** **:** ... an independent (firewalled) team. + Perform interviews, test controls, develop Security Assessment Reports (SARs), and create Plans of Action and Milestones (POAMs).… more
- Chenega Corporation (Redstone Arsenal, AL)
- …Security, and Operations (DevSecOps) areas of incident response, vulnerability scanning and management, problem management, certificate management, penetration ... team members won't re-encounter known issues. + Set up, conduct risk assessment , monitor, and maintain proxy servers, systems, and firewalls. + Perform application… more