- Deloitte (St. Louis, MO)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct thorough technical assessments and manual audits ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- Deloitte (St. Louis, MO)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct comprehensive technical assessments and manual ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- Deloitte (Richmond, VA)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct comprehensive technical assessments and manual ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- Deloitte (St. Louis, MO)
- …a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber ... Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 Rev 5 and 800-171 controls. OTHER: Perform manual audits of UNIX configurations, user access… more
- Deloitte (St. Louis, MO)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct manual audits and vulnerability analysis on ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- Deloitte (St. Louis, MO)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Independently evaluate cloud infrastructure and platform ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- Deloitte (Richmond, VA)
- …Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Leverage extensive technical expertise in Windows ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more
- US Marine Corps (Fort Meade, MD)
- …to this flyer. Responsibilities You will apply knowledge of network architecture , security fundamentals, and familiarization with multiple computer operating ... scans and analysis of network vulnerability, configuration analysis, and network architecture analysis. You will apply current software and methodologies for active… more
- COLSA Corporation (Dayton, OH)
- …Institute of Standards and Technology (NIST) Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), Endpoint Security System ... DoD Public Key Infrastructure (PKI). + Assist the Information Systems Security Manager (ISSM) and provide multi-discipline expertise covering project management,… more
- Deloitte (Richmond, VA)
- …Directives (ICDs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: -Leverage their extensive IC policy requirements to ... a client's technical backbone while enabling secure digital transformation. Includes security architecture , secure development and deployment, end-to-end cyber… more