- NANA Regional Corporation (Boston, MA)
- …issues. + Play a key role in ensuring network security and conducting vulnerability assessments. + Provide support for Risk Management Framework (RMF) and audit ... activities. + Logical Switch and Network Operations: + Operate and maintain logical NIPRNET switch connectivity, including ICAN between LANs and computer resources. + Provide touch labor for troubleshooting and repairing for logical NIPR network switch… more
- Saliense Consulting (Arlington, VA)
- …responsible for systems engineering, security engineering, and workstation and server vulnerability remediation and patch management. + Helps prepare plans for the ... development and installation of server according to present and future requirements. + Provides expert technical support, administration, and engineering on all Microsoft Windows Operating Systems. + Monitors, performance tunes, troubleshoots and resolves… more
- Texas A&M University System (College Station, TX)
- …+ Working knowledge of OT/ICS/IIoT security, intrusion detection, and vulnerability assessment for critical infrastructures. + Proficiency in system modeling, ... cybersecurity, trustworthy ML/AI, adversarial ML/AI, reinforcement learning, graph-based modeling, learning on graphs, generative AI for cybersecurity, and experience with AI-driven anomaly detection via temporal and spatial analysis. + Foundational… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …procedures, and compliance measures + Participate in security assessments, vulnerability remediation efforts, and accreditation processes + Support 24/7 operations ... and participate in on-call rotation as required for mission-critical systems + Interface with government stakeholders, vendors, and external partners in technical forums and working groups + Lead cloud migration initiatives and provide technical guidance to… more
- Deloitte (Memphis, TN)
- …of experience with the following: + Client Coordination & Prioritization + Vulnerability Assessment + Web Application Testing-App Scan + Must be legally authorized ... to work in the United States without the need for employer sponsorship, now or at any time in the future Information for applicants with a need for accommodation:… more
- Deluxe (Atlanta, GA)
- …DevSecOps pipelines, and automation + Background in application penetration testing, vulnerability assessment, and ethical hacking + Experience with security testing ... tools: SAST, DAST, IAST, RASP, SCA + Hands-on threat modeling and risk assessments within agile SDLC + Proven collaboration with DevOps to onboard tools and enforce secure coding policies + Knowledge of secure app deployment in AWS and Azure + Familiarity with… more
- Leidos (Annapolis Junction, MD)
- …aspects, evaluating security solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. + **Managing configuration and ... system integrity** by administering configuration management (CM) for security software, hardware, and firmware, ensuring compliance with security controls, and assessing the impact of system changes. + **Developing and maintaining security documentation** ,… more
- CACI International (Lisle, IL)
- …in some of the following technology areas desired: Networking, Security, Vulnerability research; etc. + Knowledge of Microsoft software applications and other ... software applications as required + Experience with high-level programming languages such as C/C++ Experience with scripting languages such as Python + Experience with source code management tools such as Git + Experience with GNU/Linux software development… more
- KeyBank (Albany, NY)
- …+ Oversee the management of 24/7 production support of applications including vulnerability remediation and risk management to corporate SLAs. + Manage, develop and ... ensure the engagement and effective execution of a small to medium size team which may include business analysts, project managers and/or scrum masters, engineers, developers, external resources and vendors against line of business or functional technology… more
- Link Solutions Inc (Adelphi, MD)
- …documentation. + Participate in security audits, STIG compliance checks, and vulnerability remediation processes related to network assets. Please note this job ... description is not designed to cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. + Must be a US Citizen. + Must have an active DoD Top Secret Clearance + Must have a BA/BS Degree… more