• Compliance Examiner & Auditor - Integrity…

    Guthrie (Sayre, PA)
    …standards. * Perform risk assessments to identify areas of vulnerability and recommend corrective actions. * Investigate compliance billing-related incidents ... and ensuring proper documentation and reporting to authorities. * Responsible for the daily management of compliance auditors * Support responses to external audits and inspections. Data Analysis & Reporting * Analyze data to detect patterns, trends, and… more
    Guthrie (01/07/26)
    - Related Jobs
  • Information Security Analyst Advisor

    General Dynamics Information Technology (Annapolis Junction, MD)
    …meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and accreditation. ... Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs),… more
    General Dynamics Information Technology (01/07/26)
    - Related Jobs
  • Cisco ISE Engineer (Secret Clearance Required)

    TEKsystems (Reston, VA)
    …or similar. + 5+ years of experience in cybersecurity with a focus on vulnerability management and network security. + Proven expertise in Cisco ISE and Centralized ... AAA platform configuration, management, and integration. + Strong knowledge of DISA STIGs, SRGs, and NIST 800-53 compliance. + Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related field. + Ability to thrive in a fast-paced,… more
    TEKsystems (01/07/26)
    - Related Jobs
  • Software Engineer II - Red Team

    Microsoft Corporation (Redmond, WA)
    …help defenders to understand and prioritize remediation by providing automated vulnerability and impact assessments. You will deliver high quality engineering ... solutions while enabling Microsoft to strengthen our defenses. Microsoft's mission is to empower every person and every organization on the planet to achieve more. As employees we come together with a growth mindset, innovate to empower others, and collaborate… more
    Microsoft Corporation (01/07/26)
    - Related Jobs
  • Cybersecurity Manager / Information Systems…

    Serco (Kirtland AFB, NM)
    …from policy or acceptable configurations. + Perform compliance audits and vulnerability assessments to support cybersecurity objectives. + Support program control ... processes to ensure risk mitigation and accreditation readiness. + Assist in the implementation of DoD security policy (eg, NISPOM, DCID 6-3) and recommend process enhancements. + Validate security requirements and recommend safeguards. + Support Security Test… more
    Serco (01/06/26)
    - Related Jobs
  • Information Technology Security Administrator

    Clark County, NV (Las Vegas, NV)
    …14 Indicate your full-time professional experience performing cyber-security vulnerability detection, design and implementing remediation. + No Experience ... + Less than 2 years + 2 to 4 years + 4 to 6 years + More than 6 years 15 Please list all employer(s) and each job title on your application where your experience was obtained in question 14. The template provided below must be completed in its entirety or the… more
    Clark County, NV (01/06/26)
    - Related Jobs
  • Systems Administrator

    AKS Engineering & Forestry (Tualatin, OR)
    …networking, and backup systems. + Oversee patch management, system updates, vulnerability remediation, and system hardening aligned with security and compliance ... standards. + Handle Tier 2/3 support issues related to systems, identity, access, and messaging. + Support compliance and audit activities, including documentation and remediation efforts related to CMMC. + Participate in IT projects that improve performance,… more
    AKS Engineering & Forestry (01/06/26)
    - Related Jobs
  • DevSecOps Engineer

    Robert Half Technology (Chicago, IL)
    …operations teams to establish and implement security standards. + Conduct vulnerability assessments, manage automated security testing, and remediate findings across ... infrastructure and applications. + Automate configuration management, infrastructure provisioning, and policy enforcement using tools such as Terraform, Ansible, or similar technologies. + Secure cloud-based deployments (AWS, Azure, GCP) and containerized… more
    Robert Half Technology (01/06/26)
    - Related Jobs
  • Principal RF Subsystems Engineer

    RTX Corporation (Tucson, AZ)
    …(ARB Generators). + Understanding of electromagnetic interference (EMI) and electromagnetic vulnerability (EMV) along with mitigation strategies in RF systems. + ... Excellent written communication and oral presentation skills. **What We Offer** Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and… more
    RTX Corporation (01/06/26)
    - Related Jobs
  • AWS Full Stack Infrastructure Engineer

    BCMC (Dulles, VA)
    …CVE findings. * Familiarity with working on WIZ or Nessus vulnerability findings, including analysis and automated remediation. Desired Certifications: * DoD ... 8570.1 IAT Level II * CSSLP (Certified Secure Software Lifecycle Professional) Required Education: * Bachelor's degree in Software Engineering, Computer Science or a related discipline is required. [Eight (8) years of experience (for a total of fourteen (14)… more
    BCMC (01/06/26)
    - Related Jobs