- Amentum (Tampa, FL)
- …Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution ... Performs assessment and authorization coordination. Advises and assists the...(STIG). The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security,… more
- Amentum (Tampa, FL)
- …Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution ... Performs assessment and authorization coordination. Advises and assists the...(STIG). The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security,… more
- Amentum (San Diego, CA)
- …Cybersecurity Systems Analyst should be able to perform security evaluations and vulnerability assessments using the DOD Assured Compliance Assessment Solution ... Performs assessment and authorization coordination. Advises and assists the...(STIG). The Cybersecurity Systems analyst should be knowledgeable of cyber network defense tools such as end point security,… more
- Leidos (San Antonio, TX)
- …monitoring tools, and cybersecurity alerts. + Familiarity with Zero Trust principles, DoD cloud security models, and current cyber threat landscapes. + Advanced ... to fulfill an important mission in support of the Sixteenth Air Force Cyber Forces. Specifically, we are seeking multiple candidates for future **_Security Control… more
- Nightwing (Sterling, VA)
- …tasks. + Security Knowledge: Understanding security protocols, threat modeling, and vulnerability assessment . + Experience with Cloud Technologies: ... demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical… more
- Talen Energy (Houston, TX)
- …and mitigating security incidents and conducting post-incident analysis. + Threat Hunting, Vulnerability mgt., SIEM, Cloud Security + Proficient in NIST, ISO ... You will proactively seek threats and vulnerabilities that drive the vulnerability management cycle. Your expertise will be essential in maintaining compliance… more
- Bank of America (Chicago, IL)
- …+ Vendor Management + Advisory + Business Acumen + Business Intelligence + Cloud Solutions + Technology System Assessment **Shift:** 1st shift (United States ... and technology groups to remediate GIS issues showing red or amber on the vulnerability remediation dashboard + Coordinate and drive remediation of ad hoc GIS issues… more
- Kratos Defense & Security Solutions, Inc. (Orlando, FL)
- …policies, standards, and procedures are established and followed. The ISSM will perform vulnerability and risk assessment analyses to support Assessment & ... policies and procedures such as System Security Plans, Risk Assessment Reports, Plans of Actions and Milestones, Assessment...Incident Response & Recovery + Lead execution of the cyber incident response plan during security events. + Coordinate… more
- Guidehouse (Suitland, MD)
- …and clients on cyber governance, risk, and compliance, cloud security, FedRAMP, vulnerability management, policy development, authorization and ... **Job Family** **:** Cyber Consulting **Travel Required** **:** Up to 10%...(SSP), Plan of Action & Milestones (POA&M), checklists, Security Assessment Plan (SAP), and other documentation in support of… more
- Lockheed Martin (Orlando, FL)
- …transformation will enable Lockheed Martin to provide more autonomous and continuous cyber support for our classified environments\. The Rotary and Mission Systems ... \(RMS\) Classified Cyber Security organization is seeking a Classified ...environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. Proven ability to manage multiple projects… more