- M. C. Dean (Chantilly, VA)
- …across our physical security infrastructure. You will also be involved in research and development (R&D) for new technologies, updates, and improvements to our ... enterprise software and applications, ensuring our systems remain at the...C-Cure + Requires an understanding of Windows patching and vulnerability remediation with ATO processes + Requires advanced knowledge… more
- Nightwing (MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- Chenega Corporation (Colorado Springs, CO)
- …the Fire Alarms Network (FARS) and ICS Network (CRIISP), Industrial Control Software (ICS), and servers at the Cheyenne Mountain Space Force Station. ... Reporting System administration. + Security configuration standards (STIG/SRG) and vulnerability management tools. + Strong analytical and troubleshooting skills for… more
- Sandia National Laboratories (Albuquerque, NM)
- …worldwide + Extraordinary co-workers + Some of the best tools, equipment, and research facilities in the world + Career advancement and enrichment opportunities + ... encryption algorithms and security protocols (RSA, SSL, TLS), as well as security vulnerability , ForgeRock, ADFS, Ping Federate, and other On Prem IDP Stacks. +… more
- General Dynamics Information Technology (Warner Robins, GA)
- …proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system. + Ensure that data ownership and ... boundaries. + Ensure configuration management (CM) for security-relevant changes to software , hardware, and firmware and that they are properly documented. +… more
- Nightwing (Annapolis Junction, MD)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the… more
- RedTrace Technologies Inc (Eglin AFB, FL)
- …proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system * Ensure that data ownership and ... (CCB) charter * Ensure configuration management (CM) for security-relevant changes to software , hardware, and firmware and that they are properly documented * Ensure… more
- Lockheed Martin (Grand Prairie, TX)
- …114,000 people worldwide and is principally engaged in the research , design, development, manufacture, integration, and sustainment of advanced technology ... Sections 18\-22 * Experience with TILE\!TM \(ETS Lindgren EMC automation software \) equipment scripts * Experience with developing test plans/procedures and reports… more
- Global Resource Solutions (Valparaiso, FL)
- …proper protection or corrective measures have been taken when an incident or vulnerability has been discovered within a system + Ensure that data ownership and ... of the AIS + Ensure configuration management (CM) for security-relevant AIS software , hardware, and firmware are properly documented. + Ensure that system recovery… more
- CACI International (Sterling, VA)
- …to work 100% on-site. You will help perform important reverse engineering and vulnerability research to help our exploitation mission. You will work, both ... in programming languages such as Python, Java, or C++ Experience with software -development tools and version-control systems (eg, Git) + PCB design and/or PCB… more