- BOOZ, ALLEN & HAMILTON, INC. (Alexandria, VA)
- …3+ years of experience using data orchestration tools, such as Splunk, to develop vulnerability management and security risk dashboards + Knowledge of ACAS, such ... or AWS Security Additional Qualifications: + Experience with Splunk Enterprise Security , STIG Manager , or similar orchestration or automation tools +… more
- M. C. Dean (District Of Columbia, DC)
- …and incident logs. **Cybersecurity Operations** + Serve as the **Information System Security Manager (ISSM)** for all assigned systems. + Monitor networks ... for real-time threat indicators; investigate and respond to security events. + Implement and operate cybersecurity tools such as ACAS, NESSUS, SCAP, and STIG… more
- Koniag Government Services (Washington, DC)
- …printer refreshes or other changes + Remotely push monthly system patches and security vulnerability updates to workstations using the Government- provided tools ... enterprise print systems and servers + Ability to provide clients with security vulnerability remediation recommendations and guidance, up to and including… more
- Emerson (Boulder, CO)
- …they meet policy criteria. + Escalate nonconforming proposals or exceptions to the Manager for review. **Risk & Vulnerability Analysis** + Monitor open source ... ensuring compliance with established policies. Working under the direction of the Manager , this role is execution focused, helping translate strategy into day-to-day… more
- Toyota (San Juan, PR)
- … security training.Ensure that all team members and new hires complete the required security awareness training. + Report to IT Manager the list of team ... coordination, analysis, testing, implementation, deployment, support, and monitoring for security operational processes, projects, or technologies. Also, it will… more
- Rigid Tactical (Norfolk, VA)
- …Professional (CAP) + CompTIA Cybersecurity Analyst (CySA+) + Certified Information Security Manager (CISM) + Certified Ethical Hacker (CEH) (Practical/Master) ... Guidance + Inter-Team Engagement: Actively work with the designated Information Systems Security Manager ISSM Information Systems Security Engineer {ISSE}… more
- TEKsystems (Tucker, GA)
- …collaboration with other GSOC departments. Maintain up-to-date knowledge of industry and security trends. Inform Manager , Security Operations on strategic ... The Supervisor, Cyber Operations, will play a key role in GSOC's Security Operations department, including a focus on meeting NERC Critical Infrastructure Protection… more
- SAIC (Pearl Harbor, HI)
- … Requirements Guides (SRGs). Report any deviations or shortfalls to the Information System Security Manager (ISSM) for action. . Support and assist with the ... Base Pearl Harbor Hickam, Hawaii. The Cybersecurity Analyst will: . Perform network security monitoring and incident response for a DoW customer. . Support the… more
- CACI International (Colorado Springs, CO)
- Cybersecurity Engineer Lead Job Category: Security Time Type: Full time Minimum Clearance Required to Start: Top Secret Employee Type: Regular Percentage of Travel ... the efficiency and effectiveness of cybersecurity operations + Analyzes complex security issues and develops effective solutions and incident response to maintain… more
- CACI International (Fort Belvoir, VA)
- …800-53 Rev 5. + Utilize agency cybersecurity tools to conduct auditing, NESSUS vulnerability scanning, vulnerability mitigation, and security control review ... and reaccreditation packages. + Document all security -relevant changes to IBS System Security Plans (SSP) in XACTA IA Workflow Manager + Interpret and guide… more