- Huntington Ingalls Industries (Dayton, OH)
- …documentation + Week 19: Developing SOPs, and implementing audits, threat and vulnerability assessments, and applying security -related software tools to manage ... and control classified information systems + Week 20: Resolving information systems security incidents Additional Goals + Project management #LI-RM1 Minimum… more
- Air National Guard Units (Kirtland AFB, NM)
- … security bulletins and notifications as they relate to Information Security Vulnerability Alerts (ISVAs). Coordination is required with peer state ... Incumbent is required to ensure compliance with Federal, DoD and DA Information Assurance/ Cyber Security policies. Utilizes extensive knowledge of all areas of… more
- Oracle (Austin, TX)
- …, certificate management , change control and implementation operations, vulnerability management , service requests, OS patching, and packaged software ... You will support critical priorities such as patient safety, cyber security , as well as contributing to...Deploy physical and virtual servers. + Complete assigned incident management tasks. + Deploy, set up, and maintain testing… more
- Nightwing (Sterling, VA)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- RedTrace Technologies Inc (Fort Belvoir, VA)
- …advanced consulting skills and extensive technical expertise for threat analysis, vulnerability assessments, and persistent penetration testing cyber campaigns. ... SECURITY CLEARANCE REQUIREMENT: TS, WITH SCI ELIGIBILITY POSITION...CITIZENSHIP Company Overview: As a Cybersecurity, Information Technology, and Management Consulting firm focused on assisting our commercial and… more
- conEdison (New York, NY)
- …personnel on all levels, required. + Working knowledge of project management , cybersecurity, computer systems, and application support, required. + Experience with ... Security Information Event manager solutions such as Splunk, preferred....manager solutions such as Splunk, preferred. + Experience with Vulnerability scanning, preferred. + Experience with honeypot solutions, preferred.… more
- Nightwing (Sterling, VA)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- Keeper Security, Inc. (Chicago, IL)
- …to date on trends in the industry, and operate as a Customer Success and Cyber Security advisor to your customers + Understand and navigate account procurement ... working with and selling to Enterprise organizations, C-level Executives, IT and Cyber Security Executives + Unrivaled sense of autonomy, ownership, and… more
- Insight Global (Reston, VA)
- …o Understanding of 2 or more of these IT/ Security functions; asset management , vulnerability management , identity and access management , network ... provides the necessary technical expertise to architect and design cyber security solutions to be deployed into...needs of the organization o Understanding of Cloud Access Security Brokers, Cloud Security Posture Management… more
- Nightwing (Arlington, VA)
- …demanding challenges. Our capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more