- TekSynap (Dahlgren, VA)
- …Definition + Enterprise Architecture (DoDAF) Modeling + System Testing & Validation + Risk and Configuration Management + Documentation and Reporting + Navy/DoD ... and architecture support for Navy enterprise IT systems. The Senior Systems Analyst ensures that system designs, integrations, and upgrades align with Department of… more
- ManTech (Annapolis Junction, MD)
- **MANTECH seeks a motivated and mission-driven Digital Network Exploitation Analyst to join our team in Annapolis Junction, MD.** You will help identify and exploit ... including software flaws, misconfigurations, and insecure protocols. Assess the risk and impact of identified vulnerabilities. + Research and analyze… more
- ManTech (Annapolis Junction, MD)
- **MANTECH** seeks a motivated, career and customer-oriented **Digital Network Exploitation** Analyst to join our team in **Annapolis Junction, MD.** This role offers ... including software flaws, misconfigurations, and insecure protocols + Assess the risk and impact of identified vulnerabilities + Research and analyze exploit… more
- KBR (Chevy Chase, MD)
- …work is at the forefront of engineering, logistics, operations, science, program management , mission IT and cybersecurity solutions. + Collaborative Environment: ... Title: Research and Technology Protection Analyst Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced… more
- Walmart (Sunnyvale, CA)
- …to join the Inkiru Data Science team @Walmart Global Tech from fraud detection and risk management . You will have the unique opportunity to work with massive ... Walmart Inc.'s unparalleled online and offline commerce. As a Senior Data Analyst , you will transform complex data into actionable insights, supporting data-driven… more
- Sumaria Systems, Inc. (Montgomery, AL)
- Information Assurance II (Vulnerability Assessment Analyst - ACAS Security Manager) Department: C5ISR Office: Maxwell AFB Gunter, AL Location: Montgomery, AL START ... APPLICATION (https://apply.hrmdirect.com/resumedirect/ApplyOnline/Apply.aspx?req\_id=3542456&source=3542456-CJB-0) Job Title: Information Assurance II (Vulnerability Assessment Analyst - ACAS Security Manager) Job Description: Information Networks… more
- Leidos (Dallas, TX)
- …command in using Bash and PowerShell for scripting and automation. + Compliance & Risk Management : + Basic working knowledge of DISA STIGs, including the ability ... to apply, verify, and document compliance. + Understands the basics of Risk Management Framework (RMF) process, including the creation of technical artifacts. +… more
- SysLogic, Inc. (Brookfield, WI)
- …new ideas, approaches, and technologies to address core business needs and align to risk tolerance. + Exhibit good time management , and presentation skills in ... The Security Analyst - Pen Testing plays a critical role in...+ Develop and maintain threat models, attack trees, and risk assessments for both software and hardware systems. +… more
- ManTech (Herndon, VA)
- …meeting customer accreditation requirements and following security controls + Will use RMF ( Risk Management Framework) NIST 800-53, NISPOM, and ICDs for ... within the Intelligence Community + Experience with NIST 800-53 and implementing Risk Management Framework + Understanding of vulnerability assessment tools like… more
- Guidehouse (Arlington, VA)
- …applicable federal and organizational policies to enable security and facilitate the management of risk . You will use Security-Focused Configuration ... to build on the general concepts, processes, and activities of configuration management by attention on the implementation and maintenance of the established… more