- TP-Link North America, Inc. (Irvine, CA)
- …specific cloud components and web applications. + Incident Response and Vulnerability Management: Support cloud and web application incident response, including ... investigation, containment, remediation, and post-incident analysis. Coordinate with cross-functional teams to ensure effective resolution. + Cloud security configuration: Analyze cloud security configurations and identify misconfigurations that could lead to… more
- Montana State University (Bozeman, MT)
- …admin in Azure GCC High or similar environments. + Experience with vulnerability management, SIEMs, and incident response. The Successful Candidate Will + Excellent ... verbal and written communication skills. + Discretion in handling sensitive information and high-stress incidents. + Ability to prioritize, multi-task, and adapt to changing priorities. + Strong analytical, problem-solving, and collaboration skills. Position… more
- L3Harris (Rochester, NY)
- …Experience with DISA STIGs and SCAP Compliance Checker + Experience interpreting vulnerability scanning results (Nessus, ACAS, etc.) + High level of personal ... motivation and initiative to learn and acquire new skills + Experience with ServiceNow CRM + Experience with DAAPM, JSIG and ICD 503 based authorization and accreditations In compliance with pay transparency requirements, the salary range for this role in New… more
- Entergy (New Orleans, LA)
- …strategic roadmap. + Follow ITIL processes for incident, change, problem, and vulnerability resolution. + The following skills and technologies are considered a ... strong plus: + ServiceNow (Incident, Request, and Configuration Management) + Process automation + Continuous Improvement methodologies + Application Performance Monitoring (APM) experience + Experience with application or infrastructure development, support,… more
- BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
- …facility analysis, or counter-proliferation technologies + Experience supporting target vulnerability analysis and kinetic and non-kinetic defeat mechanisms for WMD ... targets + Knowledge of DoD mission planning tools and intelligence data fusion + Active TS/SCI clearance; willingness to take a polygraph exam + Bachelor's degree in an Engineering, Physics, Applied Mathematics, or CS field Nice If You Have: + Experience with… more
- Lockheed Martin (Littleton, CO)
- …knowledge sharing\. * Security Compliance - Enforce baseline security controls, conduct vulnerability scans, and assist with audits \(e\.g\., NIST, DISA STIG\)\. * ... Continuous Improvement - Identify automation opportunities \(PowerShell, Python, Ansible\) to reduce manual effort and improve system reliability\. Why Work For Us: At Lockheed Martin, we're committed to helping you thrive, both personally and professionally\.… more
- Kranze Technology Solutions, Inc (Des Plaines, IL)
- …to Enterprise Mission Assurance Support Service (eMASS) + Use of automated vulnerability and compliance scanning tools such as Security Content Automation Protocol ... (SCAP), Compliance Checker (SCC), Security Technical Implementation Guides (STIGs), and Nessus + Experience with SIPRNet installation, deployment, and management We recognize that attracting the best talent is key to our strategy and success as a company. As a… more
- GovCIO (Bethesda, MD)
- …resources responsible for security implementation, monitoring, maintenance, and vulnerability remediation + Strategic Transformative planning for network ... architecture services **Qualifications** Bachelor's with 12+ years (or commensurate experience) Required Skills and Experience + CCIE Certification: Written and practical + Within each of the Cisco Certifications, the following specializations are needed and… more
- Insight Global (Sterling Heights, MI)
- …DoD RMF controls. These policies include, but are not limited to: * Vulnerability management * POA&M management * Personnel onboarding and offboarding * Incident ... response * Provide advisory to management regarding changes that may impact the security posture of the system * Preparation and submission of system security plans to upstream accrediting organizations $45-75/hr. Exact compensation may vary based on several… more
- Regions Bank (Charlotte, NC)
- …Safety & Soundness tasks such as password & API key rotations, vulnerability management, and support certificate updates + Investigate and diagnose system problems, ... recommending and implementing corrective actions + Document incidents and resolutions for future reference and knowledge sharing + Participate in post-incident reviews and recommend system improvements + Assist in data analysis and reporting tasks + Maintain… more