- AIG (Charlotte, NC)
- …be expected to be engaged on end user support, maintenance activities, vulnerability management, service improvement planning and ongoing SOX / IT Control support ... and work closely with other key IT Team Contacts (ie DBA Teams, IT Infrastructure, IAM, etc.), the Operations Team and with project leaders to ensure that all projects and deliverables are appropriately structured, developed according to the development… more
- Scotiabank (OR)
- …JBOSS, Tomcat, WebSphere) + 1+ Year IP360 & CCM Security vulnerability remediation + Bilingual English/Spanish language skills (B1+ English level) **Working ... Conditions** When required, non-standard office working hours for scheduled implementations or while on rotational 24x7 on-call support. \#LI-Hybrid Location(s): Bogota or Home-Office ScotiaTech is a business unit within ScotiaGBS, a Scotiabank Group company… more
- BOOZ, ALLEN & HAMILTON, INC. (Harbor, OR)
- …tools, RedSeal threat modeling, Splunk queries for SIEM aggregation, and ACAS vulnerability scanning + Knowledge of Cross Domain Solutions (CDS) + TS/SCI clearance ... + Bachelor's degree + CCNP Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; Top Secret clearance is required. Compensation At Booz… more
- ENS Solutions (San Diego, CA)
- …Proficient in applying DISA STIGs, managing Group Policy, and conducting vulnerability remediation using tools such as ACAS/Nessus. + Experience with virtualization ... platforms (VMware, Hyper-V), and backup/recovery operations. + Strong documentation and audit readiness skills. + Must hold a DoD 8570 IAT Level II certification (eg, Security+ CE). + Familiarity with tools such as STIG Viewer, eMASS, and HBSS is a plus.… more
- Magellan Health Services (Boise, ID)
- …of healthcare coding conventions, fraud schemes, and general areas of vulnerability , reimbursement methodologies, and relevant laws to find suspicious patterns in ... claims data, provider enrollment data, and other sources + Remain up to date on published fraud cases, schemes, investigative techniques and methodologies, and industry trends + PACKAGING OF FINDINGS AND RECOMMENDATIONS + Organize data and prepare a written… more
- ANSER (Mclean, VA)
- …in preparing for and supporting security audits, inspections, and vulnerability assessments. + Implement cryptographic and cybersecurity measures to strengthen ... system protections. + Track and document system security findings, audit results, and compliance reporting. + Collaborate with program and IT staff to resolve identified security issues and risks. + Provide subject matter support in implementing technical and… more
- Watershed Security (Virginia Beach, VA)
- …to include using SCAP benchmarks and Evaluate STIG + Performing vulnerability assessments with the Assured Compliance Assessment Solution tool + Utilization ... and process execution within eMASS + Developing Security Assessment Plans + Performing Risk Assessments + Completing full Risk Management Framework Package acting as the Validator + Communicating risk reduction recommendations to stakeholders + Clearance… more
- University of Michigan (Ann Arbor, MI)
- …data sets (eg, climate-water, health data, insurance claims, social vulnerability , American Community Survey, etc.) + Experience conducting intensive desktop ... research related, but not limited to: (1)local, state and federal policies related to water, (2) local and state emergency response and recovery practices and protocols, (3) local and state resiliency planning + Experience designing survey tools and conducting… more
- SHI (Somerset, NJ)
- …auditors and internal stakeholders. + Identify potential areas of SOX compliance vulnerability and risk; develop and implement corrective action plans for the ... resolution of problematic issues. + Facilitate internal control training to increase company-wide awareness and understanding. + Work closely with business units and function leads to ensure controls are efficient, effective, and well-integrated into business… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Infrastructure Engineer Location: Sterling, VA… more