- CACI International (Aberdeen Proving Ground, MD)
- …Control and Release Management, Material Fielding Exception, and Information Assurance Vulnerability Management / Alerts process.- + Apply knowledge concerning the ... conduct of Configured Items inspections, audits, workflows, and CM process management for the test facility **Qualifications:** + Active SECRET security clearance required + MINIMUM 3-5 years of experience AND certification referenced above + Familiarity with… more
- Honeywell (Fort Mill, SC)
- …security process activities including threat modeling, final security reviews, threat vulnerability assessment, etc. for all software and firmware development in ... IA(SPS) + Audit key process deliverables related to security for correctness and completeness. + Drive efforts with the development teams to quantify residual product risk and identification of appropriate security controls. + Provide product security related… more
- Lentech, Inc (Hanover, MD)
- …tackling some of the nation's most critical challenges in systems security and vulnerability ? Would you consider joining a leading team dedicated to protecting our ... country's most valuable assets? Lentech Inc. is a boutique engineering firm that specializes in delivering advanced, mission-focused technical solutions to support our high-profile intelligence community clients. Clearance: Current TS/SCI Poly JOB FUNCTIONS… more
- RTX Corporation (Hartford, CT)
- …following areas: incident response, business continuity/ disaster recovery, vulnerability management, application security, database security, network security, ... identity & access management, OT security, cloud security, third-party & supply chain risk management + General knowledge of national and international laws, regulations, policies, and ethics as they relate to cybersecurity (eg, DFARS, FAR, ITAR, EAR) **What… more
- System One (Cincinnati, OH)
- …organization. + Actively monitor, support, and report on comprehensive vulnerability assessments, penetration tests, and compliance-related solutions to uphold our ... security standards. + Design, set up, and configure various access solutions from remote access VPNs to site-to-site VPNs using diversified security platforms + Perform root cause analysis on security events as needed + Will be responsible for weekly… more
- TP-Link North America, Inc. (Irvine, CA)
- …potential risks for specific modules. + Incident Response and Vulnerability Management: Responsible for specific area's incident response, including investigation, ... containment, remediation, and post-incident analysis. Coordinate with cross-functional teams to ensure effective resolution. + Product cybersecurity certification: Analyze specific product security certification requirements and collaborate with… more
- University at Buffalo (Buffalo, NY)
- …detection systems ( IDS / IPS ), SIEM , encryption tools, and vulnerability management tools. + Familiarity with programming or scripting for automation (Python, ... + Experience with cloud security and network security monitoring. Experience with firewalls, intrusion… more
- RTX Corporation (San Jose, CA)
- …objectives. + Support audit readiness activities and respond to security vulnerability findings. + Provide mentorship and guidance to junior system administrators. ... + Leverage ticketing system to resolve incidents submitted by end users + Travel up to 15% **Qualifications You Must Have:** + Typically requires a degree in Science, Technology, Engineering or Mathematics (STEM) and aminimum of 10 years of prior relevant… more
- Red Gate Group (Washington, DC)
- …detection tools + Proven ability to conduct penetration testing and vulnerability assessments + Proficiency with DevSecOps methodologies and automation practices + ... Working knowledge of MS Office products including Word, Excel, Project, SharePoint, and Visio Desired Qualifications + Experience supporting Department of Defense (DoD) or Intelligence Community (IC) customers + Expertise in securing legacy systems alongside… more
- Insight Global (Keyport, WA)
- …scripting languages (Bash, PowerShell, Python). Knowledge of endpoint security, vulnerability scanning tools, and research computing environments. ability to obtain ... a government clearance or current clearance more