- General Dynamics Information Technology (Springfield, VA)
- …by technical enforcement of organizational security policies, through monitoring of vulnerability scanning devices. + Work with the Information Assurance Team, ... Security Managers and Government ISSM to ensure any Data Spills are handled appropriately. Manage the Data Spill Process, working with external agencies as required to ensure cleanup and mitigation is accomplished within required times as set out by… more
- Infinity Systems Engineering (Alexandria, VA)
- …industry standards, company policies, and regulatory requirements. + Conduct network vulnerability assessments and respond to security threats. + Support network ... VLANs, management & security, QoS, and routing protocols. + Develop and maintain SOPs and technical documentation. Technical Support & Troubleshooting: + Provide Level 2/3 support for network-related issues. + Collaborate with IT teams to resolve connectivity… more
- Cipher Tech Solutions (Tampa, FL)
- …embedded products. The focus will be on reverse engineering and potentially vulnerability analysis of provided systems via static and/or dynamic tools and ... techniques. Enablement of potential further analysis, repeatable exploitation processes, feature addition, and technical reporting are also part of day-to-day activities. Embedded application design and testing may also be performed for the target platforms.… more
- General Dynamics Information Technology (Bethesda, MD)
- …information security groups and organizations. + Possesses experience with communicating vulnerability results and risk posture to senior executives. + Possess a ... broad knowledge of Information Security policies and guidance, as well as the ability to assist in researching, evaluating, and developing relevant security policies and guidance **WHAT YOU'LL NEED TO SUCCEED:** + **Education** : Bachelors (Computer… more
- Hackensack Meridian Health (Edison, NJ)
- …gateways, etc. + Understanding of malware, emerging threats, attacks, and vulnerability management. + Excellent written and verbal communication skills. + Proficient ... computer skills that may include but are not limited to Microsoft Office and/or Google Suite platforms. **Education, Knowledge, Skills and Abilities Preferred** : + Strong knowledge of cloud technologies with SaaS, PaaS and IaaS platforms and the architectural… more
- SMX (Fort Belvoir, VA)
- …Guide) compliance for the Splunk system, including configuration and vulnerability management. + Maintain accurate and up-to-date documentation, including: + ... Data flow diagrams to illustrate data ingestion and processing. + Architecture diagrams to depict the Splunk system architecture. + System inventories to track hardware and software components. + Collaborate with the security team to ensure that the Splunk… more
- TISTA Science and Technology (Rockville, MD)
- …performance. + Apply security best practices including firewalls, access controls, vulnerability scans, and compliance with NIST/FISMA standards. + Collaborate with ... developers, architects, and business stakeholders to deliver secure, resilient, and scalable cloud solutions. Qualifications + 5+ years in DevOps/Infrastructure Engineering + 7+ years scripting/coding (Python, PowerShell, Ansible, etc.). + Deep expertise in… more
- BOOZ, ALLEN & HAMILTON, INC. (Norfolk, VA)
- …and network health assessments. + C ond uct and document cybersecurity vulnerability scans using approved tools in compliance with DoD requirements. + Maintain ... accurate network documentation and diagrams. + Lead troubleshooting efforts for escalated network issues. + Collaborate across IT teams to ensure secure, scalable, and compliant network operations. Join us. The world can't wait. You Have: + 5+ years of… more
- US Tech Solutions (Arlington, VA)
- …with evaluation, integration and onboard of security tools such as RASP, WAF, vulnerability scanner results, container analyzers, open source scanning etc is a plus ... - Work with Development, DevOps and Security teams to identify and develop automated security and compliance capabilities in support of DevOps processes. - Define the security rules that needs to be adhered to at a code level in web and mobile applications… more
- L3Harris (Carlsbad, CA)
- …remediation of identified security incidents. + Conduct and validate enterprise vulnerability management through Nessus scanning, application of DISA STIGs, and ... enforcement of FIPS-validated cryptography. + Direct enterprise endpoint management leveraging Ivanti for patch automation, compliance enforcement, and lifecycle sustainment of systems. + Lead NIST RMF activities by authoring and reviewing accreditation… more
Recent Jobs
-
Airline Lounges Operations Manager
- Sodexo (St. Paul, MN)
-
Bilingual Healthcare Call Center Agent
- TEKsystems (Houston, TX)
-
AVP Risk Engineering Specialist - Power Generation
- Zurich NA (Atlanta, GA)
-
(USA) Associate Optometrist - Walmart
- Walmart (Espanola, NM)