- Guidehouse (Mclean, VA)
- …guidelines. + Design and implement advanced security architectures for predictive threat detection, response, and real-time security insights to support emerging ... threat identification and cloud infrastructure resilience. + Ensure that...(STIGs) and Security Requirements Guides (SRGs). + Conduct full-scope vulnerability assessments and penetration testing of new and modified… more
- GCG (OH)
- …to grow, we are seeking an IT Security Analyst to support monitoring, threat detection, vulnerability management, and day-to-day security operations. In this ... Review and triage foundational security alerts under the guidance of the Security Manager + Support periodic vulnerability scans, track remediation progress, and… more
- Amentum (Fort Belvoir, VA)
- …the Government Program Manager and approval of the Contractor Program Manager . + Synthesize findings to support vulnerability identification, course of ... RED CELL ANALYST: Defense Threat Reduction Agency, Fort Belvoir, VA The Analyst...intentions, tactics, and capabilities of adversarial organizations to develop threat characterization using a combination of both classified and… more
- KBR (Sioux Falls, SD)
- …monitoring networks for security issues using SIEM/log analysis tools, performing vulnerability scanning, threat intelligence, and responding to security ... degree in an IT-related field (experience may substitute at manager 's discretion). + Minimum of 1 year of directly...with ticketing/triage systems. + Familiarity with SIEM tools and vulnerability scanning. + Knowledge of open-source threat … more
- Leidos (Ashburn, VA)
- …using Harness and Rafay. + Deep understanding of security bestpractices, including threat modeling, risk assessment, and vulnerability management. + Experience ... and ensuring secure software solutions through AWS EKS expertise, vulnerability remediation, and a "shift-left" security approach. Collaborating with agile… more
- KBR (El Segundo, CA)
- …system security policies, standards, and methodologies + Familiarity with vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense ... Coordinate changes or modifications with the system-level Information System Security Manager (ISSM), Security Control Assessor (SCA), and/or the Wing Cybersecurity… more
- Nightwing (Arlington, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Bank of America (Boston, MA)
- …Offensive Security group. The program provides services to assess the vulnerability of the bank's applications to malicious hacking activity. This intermediate ... of internal and external threats on information systems and predict future threat behavior + Incorporate threat actors' tactics, techniques, and procedures… more
- Bank of America (Denver, CO)
- …of internal and external threats on information systems and predict future threat behavior. + Incorporate threat actors' tactics, techniques, and procedures ... related protocols/technologies (eg, UNIX/LINUX, TCP/IP, Cookies) + Experience with vulnerability assessment tools and penetration testing techniques. + Solid… more
- GovCIO (Tampa, FL)
- …with a hybrid remote opportunity based on project requirements. **Responsibilities** Correlates threat data from various sources to establish the identity and modus ... operandi of hackers active in client's networks and posing a potential threat . Provides the customer with assessments and reports facilitating situational awareness… more