- ManTech (Washington, DC)
- …reviewed, and updated on a continuous basis + Conduct required IS vulnerability scans according to risk assessment parameters. Coordinate system owner concurrence ... are reported to the system owner and IS Security Manager (ISSM). Ensure the removal and retirement of ISs...or advanced degree in Computer Science, Cybersecurity, or other cyber discipline **Clearance Requirements:** + Must have a current/active… more
- Amentum (Columbia, MD)
- …meet security requirements for processing classified information. * Perform vulnerability /risk assessment analysis to support security authorization. * Provide ... cybersecurity or security authorization is required. * Bachelor's degree in Computer Science, Cyber Security or IT Engineering is required. * In lieu of a Bachelor's… more
- CACI International (Fort Meade, MD)
- …be substituted for a bachelor's degree. + General familiarization with Tenable Nessus Manager - Connect clients, run scans, create vulnerability and compliance ... clearance + CWIP IAT 3 Certification within 6 months of hire ( Cyber Workforce Improvement Program- Information Assurance Technical III) + 15 years experience… more
- KBR (Beavercreek, OH)
- …future of space defense. Position Summary: The Information System Security Manager will provide system authorization support, risk management and business continuity ... and prevention methods, incident response and management methods, auditing, vulnerability management support, and system security documentation. Key Responsibilities:… more
- Google (GU)
- …whether down the street or across the globe. As a Technical Program Manager at Google, you'll use your technical expertise to lead complex, multi-disciplinary ... development and execution of comprehensive security programs (eg, physical, personnel, cyber , and intelligence) for cable landing stations. Define program scope,… more
- RTX Corporation (Woburn, MA)
- …The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence with NIST Special Publications, customer directives, ... + Experience with various information system security tools that address vulnerability analysis and mitigation. These may include Splunk, Forcepoint, Ivanti,… more
- M. C. Dean (Vienna, VA)
- …is Building Intelligence. We design, build, operate, and maintain cyber -physical solutions for the nation's most mission-critical facilities, secure environments, ... and managing Microsoft Azure environments using Terraform and Azure Resource Manager (ARM) templates. Skilled in implementing scalable and secure cloud… more
- General Motors (Milford, MI)
- …Infrastructure team to ensure the platform is complaint with all corporate cyber -security, vulnerability , and infrastructure requirements. + Partner with and ... location at least 3 times a week {or other frequency dictated by their manager }. This job may be eligible for relocation benefits. **About GM** Our vision is… more
- SAIC (Pearl Harbor, HI)
- …security compliance in accordance with USAF Instructions, Information Assurance Vulnerability Management requirements, and maintenance task orders. + Coordinate with ... + Practical experience with enterprise level networking such as: Cisco Call Manager , Cisco Meeting Servers, Nexus, Cisco Firewalls, Cisco DNA Center, Cisco Identity… more
- The Walt Disney Company (Burbank, CA)
- …the magic by employing best-in-class services to assess, prevent, detect, and respond to cyber threats that present risk to The Walt Disney Company. We enable the ... - Product Security** role will report to the Sr. Manager overseeing Software Security Assurance. Our mission is to...activities such as secure code reviews, security testing and vulnerability triage across various TWDC applications. + Lead complex… more