- Arena Technical Resources, LLC (Wichita, KS)
- …* Policy andSTIGcompliance validation * Performance monitoring * Bug and Vulnerability patching Requirements: * Ability to clearly communicate and work with ... others * Some Cisco switch and router experience * Experience with US Air Force data networks * Proficient in MS Word, Excel, and Visio software * Experience with Cisco switches and routers * Experience withCiscoIdentity Services Engine (ISE) * Experience with… more
- TekSynap (Virginia Beach, VA)
- …(STIG) assessments, utilizing SCAP benchmarks and Evaluate STIG. + Perform vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool. + ... Manage security authorization packages and risk assessment documentation within eMASS. + Develop and maintain Plans of Actions and Milestones (POA&M) to remediate security vulnerabilities. + Execute Risk Management Framework (RMF) Step 5 authorizations as an… more
- AECOM (Portland, OR)
- …groins, and nature-based (living shoreline) solutions. + Conduct **resiliency and vulnerability assessments** for infrastructure exposed to flooding, sea level rise, ... and coastal storm impacts. + Perform **advanced wave modeling and statistical analyses** (including spectral and wind-wave calculations) to inform project design and risk mitigation. + Oversee development of technical tools, workflows, and standardized… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is seeking a highly skilled and motivated… more
- Imagine One Technology & Management (Dahlgren, VA)
- …information systems. + Lead the preparation and execution an Information Assurance Vulnerability Management (IAVM) Plan. + Lead the preparation and production of a ... System Security Administrator and Operators Manual (SSAOM). + Lead obtaining Authorization to Operate (ATO) and resolve issues in the event a US Naval warfare system is issued an Interim ATO (IATO). + Lead the technical support effort in identifying and… more
- BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
- …and data pipelines to ingest, normalize, and correlate asset data with vulnerability feeds, threat intelligence, and security findings from multiple sources + ... Knowledge of scripting languages for automation and troubleshooting, and APIs and their usage for data integration + Active TS/SCI clearance; willingness to take a polygraph exam + Asso cia te's degree and 5+ years of experience supporting IT projects and… more
- Amazon (Redmond, WA)
- …data structures and algorithms, software development, threat modeling, pen tests, or vulnerability assessments Amazon is an equal opportunity employer and does not ... discriminate on the basis of protected veteran status, disability, or other legally protected status. Our inclusive culture empowers Amazonians to deliver the best results for our customers. If you have a disability and need a workplace accommodation or… more
- Celestica (San Jose, CA)
- …validate network security controls and configurations. + Perform advanced vulnerability assessments, penetration testing, and security audits on network ... infrastructure to proactively identify and mitigate risks. + Ensure strict adherence to internal security policies and external regulatory compliance standards (eg, NIST, ISO 27001, GDPR) relevant to data center networking. + Develop and integrate automated… more
- M. C. Dean (Annapolis Junction, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, etc. + Establishes and follows a formal ... procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces + Captures all interface designs in a common interface control format, and stores interface data in a commonly accessible repository +… more
- ServiceNow, Inc. (San Diego, CA)
- …Your mission is to provide the best developer experience, providing critical vulnerability information for all our product's source code, infrastructure as code, and ... internal application source code. Additionally, you will lead our credential detection, code search, and DAST programs. You'll work closely with our Product Owner, peer organizations in Security and Product Development to set cross functional OKRs, coordinate,… more
Recent Jobs
-
Class B Delivery Driver
- Access Dubuque (Dubuque, IA)
-
Director, Business Development - K12 Education Construction
- Kraus-Anderson (Minneapolis, MN)
-
Procurement Clerk
- Robert Half Office Team (Gardena, CA)