- Guidehouse (Houston, TX)
- …Endpoint Security, Scanner Ops, Zero Trust Architecture (ZTA) Implementation, Vulnerability Management Lead, DevSecOps, and various specialized tool/process ... candidate will possess domain expertise in cybersecurity architecture, threat intelligence, risk management , and compliance, and will serve as a trusted advisor to… more
- Office of the Secretary (Washington, DC)
- …24, 2025, will be on the initial certificate referred to the hiring manager . Eligible applications received thereafter will be referred at 30-day intervals, or as ... requested by management on an as-needed basis, until the closing date...contingency operations, and interagency logistics. Conduct in-depth threat and vulnerability assessments by gathering, analyzing, and synthesizing intelligence data,… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... and transitioning service members.** **Focus Areas include:** **Cybersecurity** **Project Management ** **Logistics** **Supply Chain** **Contracts** **Field Service** **Manufacturing** **Business… more
- Truist (Charlotte, NC)
- …or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure ... or cloud-based applications and help maintain stable SAP applications via vulnerability management , on-call support, and collaboration on major infrastructure… more
- Guidehouse (Mclean, VA)
- …+ Experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. + Experience supporting DoD ... Guides (STIGs) and Security Requirements Guides (SRGs). + Conduct full-scope vulnerability assessments and penetration testing of new and modified applications,… more
- Steampunk (Washington, DC)
- …Experience as an Information System Security Officer (ISSO). + Experience with Vulnerability , Configuration, and Asset Management tools in support of Continuous ... FedRAMP, and agency-specific guidance. + Evaluate technical, operational, and management controls across cloud, on-premises, and hybrid environments. + Develop… more
- BAE Systems (Annapolis Junction, MD)
- …plans and other IA documentation + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management + Provide Configuration Management ... implement best practice methodologies for incident detection, reporting, and vulnerability remediation + Maintain records on workstations, servers, routers,… more
- Koniag Government Services (Huntsville, AL)
- …compliance controls into all phases of development (DevSecOps), code scans, dependency management , vulnerability assessment, etc. + Use Infrastructure as Code ... testing and secure software delivery. + Familiarity with DevSecOps practices: vulnerability scanning, dependency management , secure coding, secrets management… more
- Belay Technologies (Annapolis Junction, MD)
- …plans and other IA documentation. + Provide support for Information Assurance Vulnerability Alerts (IAVAs) management (initiating IAVA responses and system ... for processing multiple types of information. + Assist with the Configuration Management for information system security software, hardware, and firmware. + Analyze… more
- UnityPoint Health (Des Moines, IA)
- …continuum care manager regarding patients who have moderate or red vulnerability at transition. + Document who will assume the care coordination/ management ... care for prioritized patients . + Documents the case management plan to include: clinical needs, barriers to quality...or Hospice. + Ensure that the patient's degree of vulnerability has been captured and documented on the Transitions… more