- Enterprise Mobility (St. Louis, MO)
- …principles and best practices related to system hardening, access control, and vulnerability management + Experience with cloud platforms (AWS, Azure, GCP) and ... hybrid cloud environments + Working knowledge with containerization technologies (eg, OpenShift, Docker, Kubernetes) + Relevant certifications (eg, RHCE, LPIC, CompTIA Linux+) + ITIL Foundation certification or higher is preferred Enterprise… more
- TekSynap (Huntsville, AL)
- …Security Representative (ISSR) experts as a service through ISaaS to deliver vulnerability , compliance, and risk management services as part of a cybersecurity ... workforce. Tasks include creating a mission-focused IT security environment that supports a federal agency's workforce; prioritizing efficiency and encouraging innovation; integrating security into all aspects of IT information systems; and providing… more
- Optiv (Boston, MA)
- …of at least 2 security concepts and methods such as vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, ... enterprise security strategies, architecture and governance. + Strong presentation and verbal communication skills + Process-oriented individual with strong attention to detail, and strong organizational skills + Excellent, detailed writing skills + Ideal… more
- Stryker (Redmond, WA)
- …and licenses. + Develop automated build systems integrated with static code/ vulnerability analysis and bug tracking tools. + Create efficient deployment processes ... for medical device software and ensure compliance with industry standards and regulatory requirements. + Communicate release activities to stakeholders and incorporate feedback to improve processes. + Upgrade legacy build infrastructure to enhance security,… more
- Zantech (Washington, DC)
- …management + Security authorization processes + Incident response coordination + Vulnerability management + Cloud security architectures + Leadership and mentoring ... capabilities Required Certifications/Education: + IAT Level III: CISSP, CISM, or CASP+ Required Security Clearance: + US Citizenship and the ability to obtain and maintain an active Top Secret/SCI or higher clearance, per contract requirements. "Outstanding… more
- CGI Technologies and Solutions, Inc. (Clarksburg, WV)
- …cybersecurity systems tailored to DoD mission environments. * Conduct vulnerability analysis, capability prototyping, and secure software development. * Utilize ... platforms such as Splunk Enterprise Security and Microsoft Sentinel for threat detection, analytics, and monitoring. * Collaborate with system engineers, analysts, and mission stakeholders to align cyber capabilities with operational goals. * Ensure all… more
- CGI Technologies and Solutions, Inc. (Washington, DC)
- …other authorization documentation. * Participate in cloud security assessments and vulnerability scans. * Contribute to the development of security awareness ... materials and training sessions. **Required qualifications to be successful in this role:** * Bachelor's degree in information technology, Cybersecurity, Computer Science, Information Systems, Data Science, or Software Engineering. * 1-3 years of relevant… more
- Highmark Health (Annapolis, MD)
- …formulate appropriate risk scoring, as it relates to threat, vulnerability , likelihood, impact, security controls/counter-measures, etc. + Understand and contribute ... to inventory of risk register tracking, scoring and associated risk statements. + Perform follow up activities related to exceptions, risk acceptance, corrective action plans and additional mitigation activities. + Communicate risk treatment methodology; risk… more
- CIBC (Chicago, IL)
- …the bank's compliance risk assessments to identify potential areas of compliance vulnerability and risk, and develop corrective action plans for resolution + Support ... preparation of regular compliance reports to compliance and risk executive management and relevant risk committees, highlighting key risks, issues, and progress on compliance initiatives. + Ensure that all compliance-related documentation, including policies… more
- Ellis Medicine (Schenectady, NY)
- …LAN, telecommunications, remote access systems including firewalls, intrusion prevention, vulnerability scanners, and other network diagnostic tools. EDUCATION AND ... EXPERIENCE REQUIREMENTS: Required + Bachelor's degree in computer science, management information systems, or related field. + Two years of experience in Network Engineering in Information Systems - Required. OR + Associate's degree in computer science,… more