- Lentech, Inc (Hanover, MD)
- …interested in tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team dedicated ... to protecting our country's most valuable assets? Lentech Inc. is a boutique engineering firm that specializes in delivering advanced, mission-focused technical solutions to support our high-profile intelligence community clients. Clearance: Current TS/SCI… more
- Nightwing (Herndon, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... community, defense, civil, and commercial markets. **Nightwing is seeking a talented Program Manager to lead a dynamic network engineering team in a unique mission… more
- ARSIEM (Columbia, MD)
- …client you work with. ARSIEM is looking for a Senior OCO Product Manager with a strong background in Offensive Cyber Operations, vulnerability exploitation, ... operating systems. (Windows, Linux, etc.), protocols (HTTP, FTP, etc.), and network security services (PKI, HTTPS, etc.). + Guide the latest offensive cyber tools,… more
- ABBTECH Professional Resources, Inc. (Chicago, IL)
- …The ideal candidate will bring deep technical expertise, proven experience in vulnerability research and exploitation, and the ability to work as part of ... a collaborative offensive security team. **Primary Responsibilities** : + Conduct penetration testing operations in accordance with DHS and industry best practices.… more
- Trace Systems Inc (Portsmouth, VA)
- …various databases such as Enterprise Mission Assurance Support Service (eMASS), Vulnerability Remediation Asset Manager (VRAM), Navy Continuous Monitoring and ... against unauthorized access, ensure systems availability, and meet DoD/Navy Cyber Security (CS) implementation policy requirements and data protection safeguards. +… more
- Amentum (Fort Belvoir, VA)
- …cyber architecture, and developing cyber emulative courses of action pertaining to vulnerability assessment. The Red Cell Cyber Analyst is responsible for providing ... Warfare activities. He/She reports directly to the Red Team Analysis and Production Manager but directly fulfills requirements for the Red Cell Program Leader. The… more
- M. C. Dean (District Of Columbia, DC)
- …and incident logs. **Cybersecurity Operations** + Serve as the **Information System Security Manager (ISSM)** for all assigned systems. + Monitor networks ... for real-time threat indicators; investigate and respond to security events. + Implement and operate cybersecurity tools such as ACAS, NESSUS, SCAP, and STIG… more
- BOOZ, ALLEN & HAMILTON, INC. (Alexandria, VA)
- …3+ years of experience using data orchestration tools, such as Splunk, to develop vulnerability management and security risk dashboards + Knowledge of ACAS, such ... or AWS Security Additional Qualifications: + Experience with Splunk Enterprise Security , STIG Manager , or similar orchestration or automation tools +… more
- Emerson (Boulder, CO)
- …they meet policy criteria. + Escalate nonconforming proposals or exceptions to the Manager for review. **Risk & Vulnerability Analysis** + Monitor open source ... ensuring compliance with established policies. Working under the direction of the Manager , this role is execution focused, helping translate strategy into day-to-day… more
- Rigid Tactical (Norfolk, VA)
- …Professional (CAP) + CompTIA Cybersecurity Analyst (CySA+) + Certified Information Security Manager (CISM) + Certified Ethical Hacker (CEH) (Practical/Master) ... Guidance + Inter-Team Engagement: Actively work with the designated Information Systems Security Manager ISSM Information Systems Security Engineer {ISSE}… more