- Trace Systems Inc (Portsmouth, VA)
- …the following: + CS / INFOSEC concepts and requirements. + System / network vulnerability analysis. + Risk assessment and risk mitigation analysis. + Security ... but are not limited to: + Support the revision of the entire end-to-end Assessment and Authorization (A&A) process. + Support for Inspection and Audit conducted at… more
- Electrosoft (Belleville, IL)
- …and cloud infrastructure. This role requires a deep understanding of vulnerability management best practices, and risk assessment frameworks. The Security ... Evaluate and recommend new security tools and technologies to enhance risk assessment and vulnerability management capabilities. + Security Awareness & Training:… more
- Cambridge International Systems Inc (Norfolk, VA)
- …and Red Team test integration. + Proficiency with exploitation frameworks and vulnerability assessment tools (eg, Metasploit, Cobalt Strike). + Hands on ... objectives are achievable, traceable, and clearly defined. + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial… more
- SAM LLC (Austin, TX)
- …network (voice/data), physical security systems, data center environmental controls, private cloud services and related cyber security controls. Position reports ... member tasks and efforts. Provides status reports and performance/skills assessment feedback of project team members to the Director...control programs + Badge and Camera security systems + Cloud security configuration + Cyber Insurance and… more
- Trace Systems Inc (Portsmouth, VA)
- …+ Accreditation & Authorization (A&A) process and standards. + System / network vulnerability analysis. + Risk assessment and risk mitigation analysis. + ... but are not limited to: + Support the revision of the entire end-to-end Assessment and Authorization (A&A) process. + Support for Inspection and Audit conducted at… more
- ISC2 (Montgomery, AL)
- …we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and ... all career levels. Our charitable arm, the Center for Cyber Safety and Education, enables ISC2 and our members...The Application Security Engineer must be comfortable with securing cloud -based products in environments such as AWS, Azure and… more
- General Dynamics Information Technology (Fort Bragg, NC)
- …50 countries worldwide, offering leading capabilities in digital modernization, AI/ML, Cloud , Cyber and application development. Together with our clients, ... Obtain:** Top Secret/SCI **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity,Information Security,System Security… more
- SMX (Aiea, HI)
- …focused on upgrading current security operations using out-of-band defensive cyber operations, integrating state-of-the-art AI/ML security solutions, and providing ... implementing next-generation Zero Trust Architectures (ZTA), and ensuring the robust Assessment and Authorization (A&A) of AI/ML DoD systems in a dynamic,… more
- L3Harris (Broomfield, CO)
- …Model Based System Engineering (UML, SysML, UAF). + Experience in configuration and use of cyber defense and vulnerability assessment tools such as ACAS and ... detection systems, anti-virus systems and software deployment tools). + Support vulnerability assessment activities as required. + Support the evaluation,… more
- Amentum (Fort Meade, MD)
- …Expertise implementing Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool ... interested in using your skills to help shape the Cyber , Security, & Intel space? If so, look no...of security policies * Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities… more