- TekSynap (Fort Belvoir, VA)
- …determining scope, urgency, and potential impact; identifying the specific vulnerability ; and making recommendations that enable expeditious remediation. + Must ... have working knowledge of the CJCSM 6510.01B (Cyber Incident Handling Program) + Provide expert technical support and perform real-time cyber defense incident handling (eg, forensic collections, intrusion correlation and tracking, threat analysis, and direct… more
- AeroVironment (Centreville, VA)
- …a System Security Plan (SSP) to include continues monitoring, vulnerability risk assessments, Assured File Transfers procedures, hardware/software configuration ... management, and other security policies and processes that are required by Cognizant Security Agencies + Brief executive leadership of technical reports, customer security assessments, and audits + Review prime and subcontractor DD254's + Serve as the lead… more
- HCA Healthcare (Nashville, TN)
- …and demonstrate deep understanding of information security threat and vulnerability detection, risk assessment, risk management, and risk reduction procedures ... + 7+ years of experience operating in large organizations and measurable success in security disciplines within large organizations + 7+ years of experience developing and implementing risk assessment, risk management, and risk reduction procedures + Strong… more
- Premera Blue Cross (Mountlake Terrace, WA)
- …to systems, applications, and networks. This requires applying knowledge of vulnerability assessment and penetration testing tools. + Maintains current expertise in ... security hacks and network penetration methods. Defines and documents defensive tactics. Defines and oversee implementation plans for security configuration changes. + Provides advanced technical analysis and evidence capture as Level 3 technical support for… more
- Hartford HealthCare (Hartford, CT)
- …action plans and ongoing monitoring * Identify potential areas of compliance vulnerability and risk, develop and implement corrective action plans for resolution of ... problematic issues, and provide general guidance to avoid or deal with similar situations in the future * Provide reports of risk operations/progress and mitigation efforts and escalate potential significant inspection findings/compliance risks/impact to… more
- TekSynap (Fort Belvoir, VA)
- …this role will assist DTRA sites with STIG application, vulnerability remediation, and ATO support. Responsibilities include securing containerized workloads ... in hybrid environments and enforcing internal security controls. As part of a DCDC-certified CORA team, the Windows Reviewer will provide detailed assessment reports and recommendations for addressing findings. We offer our full-time employees a competitive… more
- COMSO, Inc (Columbia, MD)
- …and standard operating procedures + Participate in security assessments, vulnerability remediation, and continuous improvement initiatives Required Qualifications + ... 5+ years of experience administeringAzure and Microsoft 365 environments + Hands-on experience with: + Microsoft Entra ID (Azure AD) + Microsoft Intune + Microsoft Sentinel + Microsoft Defender suite + Strong understanding of: + Identity and access management… more
- Leidos (Abilene, TX)
- …products and services; methods for evaluating risk and vulnerability ; implementing mitigating improvement; and disseminating security procedures/processes. + ... Knowledge of Intelligence Community Directives (ICD) 704, ICD 705 and Technical Specifications and DoDM 5105.21, V1 thru V3 and working knowledge of other applicable Director of National Intelligence (DNI), Defense Intelligence Agency (DIA), and USAF… more
- Amentum (Waimea, HI)
- …SCCM, VMware, Nutanix, Satellite, Ansible) + Perform system hardening, patching, and vulnerability remediation using tools such as ACAS, ESS, and SCAP. + Develop ... and maintain PowerShell scripts for automation of administrative tasks and system configuration. + Support virtualization platforms (VMware, Hyper-V) and manage virtual infrastructure lifecycle. + Collaborate with cybersecurity teams to support ATO packages,… more
- City of New York (New York, NY)
- …Configure, Secure Wireless Phones, Tablets, and devices. - Perform Security Vulnerability remediation of End User Workstations, Laptops, and Tablets - Administer, ... Create, and Maintain patch management schedule based on the needs of the agency. - Maintain required patch levels for Workstations, Laptops, and Tablets regularly as dictated in the patching schedule utilizing automation via software or scripting - Safely… more