- SMX (Fayetteville, NC)
- …practices, products, and services, along with assessing risk and vulnerability , implementing effective mitigation measures, and disseminating security procedures and ... processes. + Proficiency in utilizing US Government online systems, including the Defense Information System for Security (DISS), National Background Investigation Services (NBIS), Electronic Questionnaires for Investigations Processing (e-QIP), and National… more
- M. C. Dean (Fremont, CA)
- …managing small teams. + Demonstrated understanding of Windows patching and vulnerability remediation. + Demonstrated advanced knowledge of Windows active directory ... hierarchy and implementation. + Basic knowledge of large-scale networking, VLANS and routing. + Requires reliable attendance at customer site during work hours required by customer. + Requires the ability to work flexible shifts that include nights, weekends… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …organizational assets and systems from cyber threats. + Conduct regular vulnerability assessments and security audits to identify potential weaknesses. + Monitor ... and analyze network traffic using EDR, NDR, and NIDS tools for threat detection and response. + Perform proactive threat hunting and security compliance checks in near real-time. + Stay current with emerging cybersecurity trends, IC, DOD, and NIST policies and… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …the Government, research and evaluate commercial products capable of eliminating the vulnerability or deficiency within the security tool suite. + Conduct analysis ... of alternatives and present findings of analysis results to the Government in a ckage for the Government's evaluation and Government's selection of a solution. + Collaborate and coordinate with ancillary organizations to procure, deliver, dispose, and track… more
- Themis Insight (Fort Meade, MD)
- …of compliance with applicable system security controls + Perform periodic vulnerability scans of systems + Perform account management, eg establishing, activating, ... modifying, disabling, and removing accounts. + Implement IAVA security patches and insure patch status is recorded in appropriate systems of record. + Provide in-depth experience in trouble-shooting IT systems + Provide detailed analysis and feedback to agency… more
- Raymond James Financial, Inc. (St. Petersburg, FL)
- …a plus. + Strong understanding of application instrumentation and software vulnerability remediation. + Strong knowledge of the Financial Services industry, front, ... middle, and back-office experience is a plus. **General Skills:** + Uses expertise to act as organizational authority on planning, organizing, prioritizing and overseeing activities to efficiently meet business objectives. + Applies expertise to act as the… more
- Palo Alto Networks (New York, NY)
- …& Wireless Management: Cisco Prime Infrastructure, Wireless LAN Controllers + Vulnerability Management: Rapid7, Tenable, Qualys + IP Address Management (IPAM): ... Infoblox + SIEM/SOAR platforms: Splunk, Cortex XSOAR, QRadar + SNMP and network monitoring tools for performance and availability analytics + Strong understanding of SOC workflows, incident response processes, and integration between detection, investigation,… more
- Global Resource Solutions (Arlington, VA)
- …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/ vulnerability assessment, Group Policy management and ... configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft Office Toolkits, SEIMs, Logrhythm, ACAS/Nessus/SCAP, mandatory/role-based access control concepts (eg… more
- CACI International (Arlington, VA)
- …+ Experience in Application Security Code Review and/or Application Vulnerability Assessment + Experience developing 508 compliant, cross-browser compatible user ... interfaces + Strong knowledge of Azure DevOps (ADO) and CI/CD pipelines + Exposure to Agile project management and task tracking tools such as ADO Boards or JIRA + Active Secret clearance _Desired:_ + Certifications in Azure, AWS, GCP, or other technologies +… more
- General Dynamics Information Technology (Bethesda, MD)
- …information security groups and organizations. + Possesses experience with communicating vulnerability results and risk posture to senior executives. + Possess a ... broad knowledge of Information Security policies and guidance, as well as the ability to assist in researching, evaluating, and developing relevant security policies and guidance. + **Security Clearance Level** : TS/SCI with active polygraph + **Location** :… more