- BAYADA Home Health Care (Pennsauken, NJ)
- …and ongoing risk assessments + Monitor and identify potential areas of compliance vulnerability and risk; provide advice on corrective action plans for resolution of ... problematic issues; provide general guidance on how to avoid or deal with similar situations in the future. + Review external regulatory and accreditation audit requests; guide Compliance team responses and appeals; and collaborate with other enterprise… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …+ Gain hands-on experience supporting ongoing security projects, such as vulnerability scanning, code analysis, security awareness training, and incident response ... exercises. + Deliver high-quality work in a fast-paced, dynamic work environment by managing time and effort across multiple projects. + Perform other cybersecurity-related duties as assigned, which may include assisting with security audits, compliance… more
- AeroVironment (Jessup, MD)
- …and research. + Apply knowledge of computer security principles, vulnerability analysis, and exploitation methods. + Develop innovative tradecraft, exploitation ... techniques, and concepts of operation. + Leverage knowledge of AMOD and proficiency in AMOD tools. + Work closely with operators and partners to effectively analyze and process intelligence information. + Provide subject matter expertise to not only the… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …as part of a team. Desired Experience + Eight (8+) years in vulnerability management & penetration-testing corrective actions. + Eight (8+) years supporting DoD ... defensive cyber operations: system protection, incident handling, reporting, recovery. Physical Demands + Must be able to lift 25 pounds on occasion. + Must be able to stand and walk for prolonged period amounts of time. + Must be able to twist, bend, and… more
- SimIS Inc. (Norfolk, VA)
- …Implement and maintain automated tools and scripts to perform security audits, vulnerability scanning, and other security tasks. + Work closely with development and ... operations teams to ensure security is a shared responsibility and to foster a culture of security awareness. + Continuously monitor systems for security vulnerabilities and proactively mitigate risks and potential breaches. + Verify that software and… more
- Guidehouse (Chantilly, VA)
- …such as system security plans, SOPs, audit logs, configuration scans, and vulnerability scans + Evaluating the implementation and effectiveness of IT controls using ... provided artifacts against federal requirements, industry guidance, and leading best practices + Documenting the results of IT controls testing in a consistent and high-quality manner that would allow others to review and understand the results + Summarizing… more
- Amentum (Wahiawa, HI)
- …information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information ... assurance, and/or systems engineering. + Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course) may be considered toward relevant experience requirements (24-week JCAC counts as 6 months of experience). 10+ years of… more
- SAP (Austin, TX)
- …chain compliance** + Integrate software bill of materials (SBOM) management, vulnerability scanning, and attestation tooling into the pipeline for continuous ... compliance and supply chain security. + **Automate infrastructure provisioning** + Design and automate infrastructure with tools like Terraform or Ansible, ensuring efficient, repeatable, and secure code deployments. + **Implement attestation and SLSA… more
- SAIC (Charleston, SC)
- …vCenter, and associated cloud infrastructure components + Perform system hardening, vulnerability mitigation, and work with IA/C&A teams to execute required security ... scan, compliance audits, and applicable STIG templates for VMware and server components + Troubleshoot VMware Site Recovery Manager (SRM) and perform upgrades/STIGS on virtual appliance + Troubleshoot complex system issues in preproduction and production… more
- ManpowerGroup (Dallas, TX)
- …experience. + 5+ years in application security, secure development, and vulnerability management. + Hands-on experience with Veracode, Burp Suite, and other ... DAST/SAST tools. + Strong coding/scripting skills in Java, Python, and familiarity with CI/CD pipelines. + Knowledge of OWASP Top 10, SANS 25, and cloud security (AWS, Azure). **What's in it for me?** + Opportunity to lead enterprise-level application security… more