- TekSynap (Chantilly, VA)
- …during the lifecycle of the system including updating network diagrams, vulnerability scans, STIG checklists, hardware/software lists, and SCRM certificates. + ... Maintains responsibility for the day-to-day security operations of the system ensuring the network, system, application, or service is operated, maintained, and disposed of in accordance with SDA security policies and procedures outlined in the security… more
- KBR (Sioux Falls, SD)
- …containers, and specialized software. + Perform system maintenance, patching, and vulnerability remediation to ensure a secure and stable environment. + Troubleshoot ... and resolve system issues using diagnostic tools and root cause analysis. + Manage user access controls and system security settings. + Develop and maintain technical documentation, including SOPs and system configurations. + Serve as a technical lead on IT… more
- KBR (Beavercreek, OH)
- …achieve this through passive evaluations (compliance audits) and active evaluations ( vulnerability assessments). Position is a corporate position, and employment is ... not tied to a contract. + Candidate will perform Information Assurance and IT Security tasks to ensure the secure operation of the KBR information systems as a part of the KBR Information Assurance Operations team. + Establishes strict program control… more
- APTIM (Boca Raton, FL)
- …+ Living shoreline design and ecosystem restoration + Adaptation plans, vulnerability assessments, and resiliency strategies **Basic Qualifications:** + 7+ years of ... coastal engineering experience + Bachelor's Degree in Civil or Coastal Engineering required + Professional Engineer (PE) license in the State of Florida or the ability to be licensed within 90 days of hire + In depth understanding of the coastal and marine… more
- Nightwing (Pensacola, FL)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. NightWing is supporting a US Government customer on a large… more
- KBR (Chantilly, VA)
- …and document scheduled maintenance, including patches & hotfixes + Assessment: vulnerability , document, and mitigate + Access: Help users with requests (permissions, ... access, etc.) + Systems: Make recommendations for future systems Work Environment: + Location: On-site. + Travel Requirements: Minimal travel. + Working Hours: Standard 40 hours per week. Qualifications: Required: + Clearance: Top Secret SCI with Polygraph. +… more
- Optiv (Phoenix, AZ)
- …Experienced with multiple security concepts and methods, such as vulnerability assessments, data classification, privacy assessments, incident response, security ... policy creation, enterprise security strategies, architectures, and governance. + Strong understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, Linux), and security technologies (endpoint security, DLP, firewalls, IDS/IPS,… more
- Alaka'ina Foundation Family of Companies (Arlington, VA)
- …Protocols, Services Management (PPSM) Compliance + DoD Cyber Scorecard Compliance + Vulnerability Scanning and Analysis + IT Personnel Security Auditing + Other ... duties as assigned. REQUIRED DEGREE/EDUCATION/CERTIFICATION: + Bachelor of Science in Computer Science or related field or 3-5 years of experience in the cybersecurity field. + IAM Level II, IAW AR 25-2 and DA Pam 25-2-6 REQUIRED SKILLS AND EXPERIENCE: +… more
- DuPont (Wilmington, DE)
- …between IT, Automation & Process Control (A&PC), Operations, Incident Response, Vulnerability Management, and the broader Cyber Operations leadership. The position ... ensures alignment of cybersecurity standards and practices across diverse technical teams, enabling resilient and secure OT ecosystems. Facilitates cross-functional alignment with long-term strategic priorities and ensure transparency and coordination in the… more
- Ingersoll Rand (Davidson, NC)
- …and hands-on coursework (lab) experience with cybersecurity endpoint, network, vulnerability , forensic and log management tools. + Basic understanding, knowledge ... of and hands-on capabilities with operating system configuration (Windows, Unix, Linux) and networking (DNS, DHCP, routing protocols). + Ability to analyze event and incident logs, and work with detect and respond teams to assess security events related to… more