- Amentum (Melbourne, FL)
- …procedures. . Perform facility security inspections, risk assessments, and vulnerability analyses. . Investigate security incidents and prepare reports with ... corrective actions. . Coordinate with Space Force, government agencies, and contractors on security requirements. . Support audits, inspections, and self-assessments to ensure compliance. Minimum Requirements: . Active Secret Clearance (Top Secret preferred).… more
- Link Solutions Inc (Durham, NC)
- …Collaborate with IT and Cybersecurity teams to support remediation, patching, and vulnerability scanning efforts. Please note this job description is not designed to ... cover or contain a comprehensive listing of activities, duties, or responsibilities that are required of the employee for this job. + Must be a US Citizen. + Must have an active DoD Top Secret Clearance + Must have an MS or BA/BS in computer sciences or… more
- SAIC (Chantilly, VA)
- …Demonstrated experience with Rapid7, WebInspect, AppDetective, CIS-CAT, and other vulnerability assessment tools and processes. + Information security certifications ... such as CISSP, CISSE, CISA, CEH, CCSP, etc. + Demonstrated experience with computer and network vulnerabilities (eg, malware, zero-day attacks, denial of service attacks, etc.). REQNUMBER: 2510066 SAIC is a premier technology integrator, solving our nation's… more
- CIBC (Chicago, IL)
- …and deep risk expertise in areas such as cloud, network, cybersecurity, DevOps, vulnerability management, and IT service management to assess and challenge risks and ... controls across technology and business lines. Support risk activities across the team, including incident management, deficiency management, risk reviews, and risk assessments, operating within a matrix team environment, and driving continuous improvement in… more
- Bayer (Seattle, WA)
- …GDPR, NIST, & CIS; providing software, network security & vulnerability management; maintaining current insights into standard security regulations, policies, ... & procedures for information systems; maintaining written documentation for product project & program strategies, and security SOP's & standards; using Agile, Scrum & Kanban methodologies to reduce attack surface & improve security engagement; driving logging… more
- Huntington Ingalls Industries (Dayton, OH)
- …design documents for anti-tamper solutions (eg Anti-Tamper Plans) and conduct vulnerability analysis of system level anti-tamper architectures + Author technical ... reports to document vulnerabilities of proposed anti-tamper solutions and provide technical recommendations for key DoD acquisition decision makers + Support technical interchange meetings and program reviews with US Air Force and DoD program offices and… more
- MyFlorida (Tallahassee, FL)
- …file encryption, secure authentication, and role-based access control (RBAC). + Perform vulnerability assessments and security audits on the EFT server. + Use ... logging tools, dashboards, and performance metrics to monitor system health. + Identify bottlenecks and optimize file transfer efficiency. + Configure user roles, group policies, and access permissions for internal and external users. + Integrate Active… more
- Capgemini (Chicago, IL)
- …security posture, driving continuous improvement. Support incident response and vulnerability remediation planning. Ensure documentation and audit trails meet ... internal and external standards. **What You'll Bring** Proven experience as a Product Owner in cybersecurity or infrastructure domains. Strong understanding of threat modelling, secure software development, and DevSecOps. Familiarity with frameworks such as… more
- State of Colorado (Adams County, CO)
- …Federal Standards. This includes proper SAB/VV/VAB (Sexually/Violently Aggressive Behavior/ Vulnerability to Victimization (SAB/VV) Risk Assessment Tool) risk ... assessment or reassessment. Internal Quality Control - Review all incidents that occur within the youth center are written within the guidelines of DYS Policy. Will supervise and oversee accurate documentation of those incidents and provide feedback to the… more
- Lowe's (Charlotte, NC)
- …enablement and communications strategy + Participates in regular security vulnerability assessments + Assistsduring integration and user acceptance testing ... activities + Assistsas needed during information security incidents **Minimum Qualifications** + Bachelor's Degree in Computer Science, CIS, Engineering, Business Administration, Cybersecurity, or related field (or equivalent work or military experience in a… more