• Cyber Security Engineer - Managing Consultant

    Guidehouse (Houston, TX)
    …Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process ... candidate will possess domain expertise in cybersecurity architecture, threat intelligence, risk management , and compliance, and will serve as a trusted advisor to… more
    Guidehouse (11/28/25)
    - Related Jobs
  • Executive Protection Agent

    Office of the Secretary (Washington, DC)
    …24, 2025, will be on the initial certificate referred to the hiring manager . Eligible applications received thereafter will be referred at 30-day intervals, or as ... requested by management on an as-needed basis, until the closing date...contingency operations, and interagency logistics. Conduct in-depth threat and vulnerability assessments by gathering, analyzing, and synthesizing intelligence data,… more
    Office of the Secretary (11/16/25)
    - Related Jobs
  • Nightwing Military Program

    Nightwing (Sterling, VA)
    …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... and transitioning service members.** **Focus Areas include:** **Cybersecurity** **Project Management ** **Logistics** **Supply Chain** **Contracts** **Field Service** **Manufacturing** **Business… more
    Nightwing (12/11/25)
    - Related Jobs
  • SAP Basis Software Engineer II

    Truist (Charlotte, NC)
    …or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure ... or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure… more
    Truist (10/25/25)
    - Related Jobs
  • Cloud Cybersecurity Subject Matter Expert

    Guidehouse (Mclean, VA)
    …+ Experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. + Experience supporting DoD ... Guides (STIGs) and Security Requirements Guides (SRGs). + Conduct full-scope vulnerability assessments and penetration testing of new and modified applications,… more
    Guidehouse (12/20/25)
    - Related Jobs
  • Cloud Security Control Assessor

    Steampunk (Washington, DC)
    …Experience as an Information System Security Officer (ISSO). + Experience with Vulnerability , Configuration, and Asset Management tools in support of Continuous ... FedRAMP, and agency-specific guidance. + Evaluate technical, operational, and management controls across cloud, on-premises, and hybrid environments. + Develop… more
    Steampunk (12/20/25)
    - Related Jobs
  • Senior ISSO

    BAE Systems (Annapolis Junction, MD)
    …plans and other IA documentation + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management + Provide Configuration Management ... implement best practice methodologies for incident detection, reporting, and vulnerability remediation + Maintain records on workstations, servers, routers,… more
    BAE Systems (12/09/25)
    - Related Jobs
  • Artificial Intelligence (AI) Engineer

    Koniag Government Services (Huntsville, AL)
    …compliance controls into all phases of development (DevSecOps), code scans, dependency management , vulnerability assessment, etc. + Use Infrastructure as Code ... testing and secure software delivery. + Familiarity with DevSecOps practices: vulnerability scanning, dependency management , secure coding, secrets management more
    Koniag Government Services (11/27/25)
    - Related Jobs
  • Senior Information Systems Security Officer (ISSO)

    Belay Technologies (Annapolis Junction, MD)
    …plans and other IA documentation. + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system ... for processing multiple types of information. + Assist with the Configuration Management for information system security software, hardware, and firmware. + Analyze… more
    Belay Technologies (11/09/25)
    - Related Jobs
  • Care Coord

    UnityPoint Health (Des Moines, IA)
    …continuum care manager regarding patients who have moderate or red vulnerability at transition. + Document who will assume the care coordination/ management ... care for prioritized patients . + Documents the case management plan to include: clinical needs, barriers to quality...or Hospice. + Ensure that the patient's degree of vulnerability has been captured and documented on the Transitions… more
    UnityPoint Health (10/17/25)
    - Related Jobs