• Cybersecurity Analyst

    Trace Systems Inc (Portsmouth, VA)
    …the following: + CS / INFOSEC concepts and requirements. + System / network vulnerability analysis. + Risk assessment and risk mitigation analysis. + Security ... but are not limited to: + Support the revision of the entire end-to-end Assessment and Authorization (A&A) process. + Support for Inspection and Audit conducted at… more
    Trace Systems Inc (11/27/25)
    - Related Jobs
  • Information System Security Engineer

    Electrosoft (Belleville, IL)
    …and cloud infrastructure. This role requires a deep understanding of vulnerability management best practices, and risk assessment frameworks. The Security ... Evaluate and recommend new security tools and technologies to enhance risk assessment and vulnerability management capabilities. + Security Awareness & Training:… more
    Electrosoft (09/17/25)
    - Related Jobs
  • Exploitation Analyst - Top Secret Clearance |

    Cambridge International Systems Inc (Norfolk, VA)
    …and Red Team test integration. + Proficiency with exploitation frameworks and vulnerability assessment tools (eg, Metasploit, Cobalt Strike). + Hands on ... objectives are achievable, traceable, and clearly defined. + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial… more
    Cambridge International Systems Inc (12/04/25)
    - Related Jobs
  • IT Security Manager

    SAM LLC (Austin, TX)
    …network (voice/data), physical security systems, data center environmental controls, private cloud services and related cyber security controls. Position reports ... member tasks and efforts. Provides status reports and performance/skills assessment feedback of project team members to the Director...control programs + Badge and Camera security systems + Cloud security configuration + Cyber Insurance and… more
    SAM LLC (10/25/25)
    - Related Jobs
  • Navy Qualified Validator

    Trace Systems Inc (Portsmouth, VA)
    …+ Accreditation & Authorization (A&A) process and standards. + System / network vulnerability analysis. + Risk assessment and risk mitigation analysis. + ... but are not limited to: + Support the revision of the entire end-to-end Assessment and Authorization (A&A) process. + Support for Inspection and Audit conducted at… more
    Trace Systems Inc (11/27/25)
    - Related Jobs
  • Application Security Engineer

    ISC2 (Montgomery, AL)
    …we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and ... all career levels. Our charitable arm, the Center for Cyber Safety and Education, enables ISC2 and our members...The Application Security Engineer must be comfortable with securing cloud -based products in environments such as AWS, Azure and… more
    ISC2 (11/20/25)
    - Related Jobs
  • Information Security Analyst

    General Dynamics Information Technology (Fort Bragg, NC)
    …50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud , Cyber and application development. Together with our clients, ... Obtain:** Top Secret/SCI **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity,Information Security,System Security… more
    General Dynamics Information Technology (12/10/25)
    - Related Jobs
  • Information System Security Engineer (ISSE)

    SMX (Aiea, HI)
    …focused on upgrading current security operations using out-of-band defensive cyber operations, integrating state-of-the-art AI/ML security solutions, and providing ... implementing next-generation Zero Trust Architectures (ZTA), and ensuring the robust Assessment and Authorization (A&A) of AI/ML DoD systems in a dynamic,… more
    SMX (12/05/25)
    - Related Jobs
  • Specialist, Info Security Systems Engineer Secret…

    L3Harris (Broomfield, CO)
    …Model Based System Engineering (UML, SysML, UAF). + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and ... detection systems, anti-virus systems and software deployment tools). + Support vulnerability assessment activities as required. + Support the evaluation,… more
    L3Harris (11/12/25)
    - Related Jobs
  • Information Systems Security Engineer - Principal

    Amentum (Fort Meade, MD)
    …Expertise implementing Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool ... interested in using your skills to help shape the Cyber , Security, & Intel space? If so, look no...of security policies * Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities… more
    Amentum (10/23/25)
    - Related Jobs