- Nightwing (Lumber Bridge, NC)
- …support to students as needed, addressing questions and challenges. + Collaborate with program manager to ensure course content is accurate and mission-aligned. ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence,… more
- Nightwing (Lumber Bridge, NC)
- …support to students as needed, addressing questions and challenges.** **Collaborate with program manager to ensure course content is accurate and ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence,… more
- TekSynap (Washington, DC)
- …safeguard systems from unauthorized access, misuse, or destruction. + Provide technical expertise in vulnerability assessments, risk analysis, network defense, ... DoD 8570 IAM Level III Baseline Certification: + Certified Information Security Manager (CISM) + Certified Information Systems Security Professional (CISSP) + GIAC… more
- BlueOval SK (Glendale, KY)
- …Maintains quality service by following organization standards. + Maintains technical knowledge by attending educational workshops; reviewing publications. + ... other attack artifacts in support of incident investigations + Experience with vulnerability scanning solutions + Proficiency with any of the following; Anti-Virus,… more
- Dominion Energy (Glen Allen, VA)
- …related fields. **Key Responsibilities:** + Assist with weekly cyber vulnerability assessments, including reviewing asset lists, obtaining substation diagrams, and ... handheld devices and inspection software. + Analyze engineering documents to verify technical schemes and asset configurations. + Perform data analysis on asset… more
- Global Resource Solutions (Springfield, VA)
- …pursuant to Intelligence Community Directive (ICD) 704 requirements. + Provide CI technical expertise to support vulnerability mitigation efforts. + Provide CI ... understanding of most of the applicable analytical tools (Multi-media Message Manager (M3), Palantir, Tripwire Analytic Capability (TAC), ARCSIGHT, RSA Security… more
- Toyota (Plano, TX)
- …well as support and enhance current risk management capabilities. Reporting to the Manager , the person in this role will support the Governance, Risk, and Compliance ... Splunk, CrowdStrike, etc. used to enable and automate risk and vulnerability management processes (ie, risk assessments, risk mitigation strategies, risk register,… more
- Lockheed Martin (Littleton, CO)
- …Polygraph\.** The Cybersecurity Specialist will partner with the security team, program , and government customers to perform as an Information Systems Security ... implementations\. \- Manage risk to the information system by validating the technical administration of IS in accordance with internal LM and customer security… more
- Kratos Defense & Security Solutions, Inc. (Colorado Springs, CO)
- …Access Program Implementation Guide Rev 4, and DISA Security Technical Implementation Guides. Applicants selected will be subject to a government security ... security of classified government systems. Reports to the Information Systems Security Manager , and perform all tasks assigned to them. The System Administrator will… more