- M. C. Dean (Fremont, CA)
- …and system extensions. + Requires an understanding of Windows patching and vulnerability remediation. + Requires a basic knowledge of Windows active directory ... hierarchy and implementation. + Requires a basic knowledge of large scale networking, VLANS and routing. + Requires reliable attendance at customer site during work hours required by customer. + Requires the ability to work flexible shifts that may include… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Systems Integrator Location: Sterling, VA… more
- City of New York (New York, NY)
- …the Commissioner and all divisions at ACS. OGC identifies areas of legal vulnerability and coordinates with other Divisions to ensure compliance with court orders, ... consent decrees, and other legal and regulatory mandates. OGC also works closely with the NYC Law Department to minimize risk and avoid litigation and defend ACS in class action and individual lawsuits. OGC is comprised of six legal units and two non-legal… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Site Reliability Engineer Location: Sterling, VA… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Job Title: Platform/Infrastructure Engineer Location:… more
- Deloitte (St. Louis, MO)
- …conduct comprehensive technical assessments and perform detailed analysis of vulnerability scans to ensure compliance with Intelligence Community Directives (ICDs), ... IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct thorough technical assessments and manual audits of host-based security… more
- Proofpoint (Alexandria, VA)
- …are recommended: + Cloud security and shadow IT monitoring + IT security, vulnerability or risk assessments, and policy enforcement + Data Loss Prevention (DLP), ... compliance and privacy + Enterprise email solutions such as Exchange, G-Suite, Lotus Domino _or _ working knowledge of SMTP + Additional skills that are added bonuses include: + Directory Services and protocols such as AD, Azure AD, LDAP, iDP (identity… more
- HCA Healthcare (Charleston, SC)
- …accordance with company standards + Partner with appropriate stakeholders on vulnerability remediation + Engage in Architecture Review Committee discussions to ... identify and address Third Party solution variance from company standards + Support, coordinate, and manage incident response and investigation activities + Evaluate and recommend security solutions that balance risk mitigation with business functionality +… more
- Amazon (Seattle, WA)
- …penetration testing, source code review, configuring advanced runtime and static vulnerability testing tools and the development of exploits; programming in Java, ... C, C++, Perl, Ruby or Python; and coordinating responsibility of technical security tasks. Basic Qualifications - Bachelor's degree in a STEM field (Science, Technology, Engineering, Mathematics), or 2+ years of IT Security experience - Knowledge of networking… more
- Guidehouse (San Antonio, TX)
- …data exchange protocols. + Risk Management: Conduct security risk assessments, vulnerability analyses, and develop mitigation strategies for all system interfaces ... and data flows. + Policy & Compliance: Develop, review, and enforce security policies, standards, and guidelines; ensure all system components and integrations meet legal, regulatory, and privacy requirements. + Incident Response: Lead incident response… more