- Truist (Charlotte, NC)
- …or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure ... or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure… more
- Guidehouse (Mclean, VA)
- …+ Experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. + Experience supporting DoD ... Guides (STIGs) and Security Requirements Guides (SRGs). + Conduct full-scope vulnerability assessments and penetration testing of new and modified applications,… more
- Steampunk (Washington, DC)
- …Experience as an Information System Security Officer (ISSO). + Experience with Vulnerability , Configuration, and Asset Management tools in support of Continuous ... FedRAMP, and agency-specific guidance. + Evaluate technical, operational, and management controls across cloud, on-premises, and hybrid environments. + Develop… more
- BAE Systems (Annapolis Junction, MD)
- …plans and other IA documentation + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management + Provide Configuration Management ... implement best practice methodologies for incident detection, reporting, and vulnerability remediation + Maintain records on workstations, servers, routers,… more
- Koniag Government Services (Huntsville, AL)
- …compliance controls into all phases of development (DevSecOps), code scans, dependency management , vulnerability assessment, etc. + Use Infrastructure as Code ... testing and secure software delivery. + Familiarity with DevSecOps practices: vulnerability scanning, dependency management , secure coding, secrets management… more
- Belay Technologies (Annapolis Junction, MD)
- …plans and other IA documentation. + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system ... for processing multiple types of information. + Assist with the Configuration Management for information system security software, hardware, and firmware. + Analyze… more
- UnityPoint Health (Des Moines, IA)
- …continuum care manager regarding patients who have moderate or red vulnerability at transition. + Document who will assume the care coordination/ management ... care for prioritized patients . + Documents the case management plan to include: clinical needs, barriers to quality...or Hospice. + Ensure that the patient's degree of vulnerability has been captured and documented on the Transitions… more
- Woodforest National Bank (The Woodlands, TX)
- …information systems, network, databases, and web-based security. Also, conducts vulnerability assessments and monitors systems, network, databases, and web for ... regulations and privacy laws as applicable. . Vulnerabilities: . Lead vulnerability assessments, monitor systems, and ensure critical and high vulnerabilities are… more
- Foxhole Technology, Inc (Alexandria, VA)
- …and reporting requirements of DoD/DISA IAVM and DHS Information Security Vulnerability Management (ISVM) program utilizing existing processes and procedures ... Assessment Solution (ACAS), Tanium, and Continuum portals and maintain asset management within the prescribed tools. + Provide focused reporting on vulnerabilities… more
- Frontier Technology Inc. (Norfolk, VA)
- …DCWF. CONTRACTOR shall conduct independent comprehensive assessments of the management , operational, and technical security controls and control enhancements ... means of improving operational security posture in accordance with the Risk Management Framework Process Guide series .CONTRACTOR shall apply Navy Assessment &… more