- Guidehouse (Charleston, SC)
- …required reports. + Experience with the following Cyber Areas: + Vulnerability Analysis + Network Security Monitoring, + Incident Response/Forensics, + ... **Job Family** **:** IT Cyber Security (Digital) **Travel Required** **:**...program. Individual shall have experience assisting or developing system security policy and ensuring compliance of change management… more
- Amentum (Columbia, MD)
- **Your Impact:** Are you interested in using your skills to help shape the Cyber , Security , & Intel space? If so, look no further. Amentum is seeking a **Senior ... threats/risks throughout the program life cycle. * Contributes to the security planning, assessment, risk analysis, risk management , certification and awareness… more
- Deloitte (St. Louis, MO)
- …development lifecycle; Participate, and sometimes lead, in the planning/execution/reporting of security audits and network vulnerability assessments with minimal ... secure success. Work You'll Do We are seeking a Security Controls Assessor (SCA) to assist with assessing government...GCIH) + 8+ years of experience with NIST Risk Management Framework and Cyber Assessment + 8+… more
- Nightwing (AL)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... + TPM and Secure Boot technologies + Security Concepts + DOD System Security Engineering and standards (RMF, Cyber Resiliency, Anti-Tamper, etc. ) + Reading… more
- Stillwater Human Capital (Boise, ID)
- …Idaho. The ideal candidate will bring expertise in Information Assurance (IA), vulnerability management , and compliance with DoD cybersecurity directives while ... standards and RMF processes. + Experience with eMASS, STIG compliance, and vulnerability management preferred. + Strong understanding of Army or DoD… more
- Nightwing (Palm Bay, FL)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- Arena Technical Resources, LLC (Tyndall AFB, FL)
- …ACAS scans. - How to manage Plan of Action and Milestones - Experience with Cyber Security Service Provider implementation - Experience with DoD Cyber ... requirements (eg, NIST, ISO 27001, etc.). - Conduct regular security assessments, vulnerability scans to identify and...III certification IAW the DoD directive 8140.01 Cyberspace Workforce Management such as CISSP, CISM, or GSLC/GIAC. - Strong… more
- Bank of America (Boston, MA)
- …the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program provides ... application security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods to evolving and… more
- Cambridge International Systems Inc (Norfolk, VA)
- …POA&Ms, Privacy Impact Assessments, etc.) using eMASS and DADMS. + Perform security assessment testing, vulnerability analysis (eg, ACAS), and ensure control ... today's most complex and critical challenges in defense and security . We are currently seeking a Fully Qualified Validator...Assessor (Work Role 612) in alignment with the DoD Cyber Workforce Framework (DCWF). + Conduct independent validations of… more
- Scotiabank (Dallas, TX)
- …remediation programs that span multiple control areas, including Identity & Access Management (IAM), Data Protection, Vulnerability Management , Asset & ... Provides oversight, planning, execution, and delivery of the IT Risk and Cyber Security remediation program. Later leveraging best practices/ learnings globally… more