- Navy Exchange Services (NEX) (Virginia Beach, VA)
- …team in protecting an organization s systems and data by performing vulnerability assessments monitoring for and responding to security events and helping to ... manage security tools. This role provides hands-on experience in areas like incident response threat research and developing security awareness documentation. Duties and Responsibilities: Interns job duties are specified in the Individual Assignment Plan… more
- Insight Global (Tarpon Springs, FL)
- …activities or events. * Responding promptly to varying levels of vulnerability , including life-threatening situations and natural disasters. 3. Emergency Response: * ... Acknowledging and appropriately handling emergency, non-emergency, and alarm calls. * Safely assessing alarm causes and providing assistance or direction as needed. * Administering initial first aid based on your training level. 4. Fire Safety and Prevention:… more
- RTX Corporation (Fullerton, CA)
- …CEH + Ability to perform security testing and validation, including automated vulnerability scanning such as Nessus, STIG, Evaluate STIG and/or RADIX + Experience ... with leading scrum teams and using Jira **What We Offer** + Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we value: Trust, Respect, Accountability, Collaboration, and Innovation + Relocation… more
- Insight Global (Cincinnati, OH)
- …This team will help to refine, develop, and deploy component upgrades, vulnerability remediations, and penetration test remediations to the suite of custom line ... of business applications. Software engineers should be capable of working with the full Microsoft stack. Upgrade components in existing .NET framework and .NET applications. Components commonly upgraded: * Migrate to SQL 2019 * Migrate reports to SSRS 2019 *… more
- BAE Systems (Sterling, VA)
- …audits, compliance, and lifecycle management. + Support security audits and vulnerability assessments by providing system data, implementing remediation actions, and ... maintaining audit-ready configurations. + Execute system changes and upgrades in accordance with program change and configuration management processes. Support & Collaboration + Provide Tier 2 incident response by troubleshooting escalated issues, restoring… more
- Leonardo DRS, Inc. (Fitchburg, MA)
- …Quality, and Warehouse). Evaluate business forecasts and pinpoint any areas of vulnerability of company requirements. Establish plans for all development efforts to ... hit customer milestones business requirements. + Hold a production kick-off meeting with the Operations team after the initial Kick-Off held by the Program Manager advising of the scope of the award and expectations on the shop floor. Ensure the appropriate… more
- Intelligent Waves (Linthicum Heights, MD)
- …analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, Produce ability, etc.) + Establish and follow a ... formal procedure for coordinating system integration activities among multiple teams, ensuring complete coverage of all interfaces + Develop comprehensive SOA solutions + Develop operational view, technical standards view, and system and services view for… more
- Insight Global (Providence, RI)
- …of the controls (eg, reviewing configurations, analyzing logs, conducting vulnerability scans). 5. Reporting: Document the audit findings, including any ... weaknesses or vulnerabilities discovered, and provide recommendations for improvement. 6. Follow-Up: Track the implementation of the recommendations and conduct periodic re-assessments to ensure ongoing compliance. We are a company committed to creating… more
- CACI International (Frederick, MD)
- …system hardening across Windows/Linux environments. + Assessment & Remediation - Conduct vulnerability scans using tools like Nessus, ACAS, and SCAP. Analyze scan ... results and manage remediation efforts to reduce risk. + Authorization Support - Support the Assessment & Authorization (A&A) process to obtain and sustain ATOs. Manage XACTA data requirements and ensure alignment with DIA RMF processes. + Continuous… more
- Amentum (Forest Park, GA)
- …interpretation, and preservation of digital evidence in support of network vulnerability mitigation, intelligence operations, and different types of investigations + ... Bachelor's degree in a relevant field is preferred, although we will also consider candidates with significant experience in lieu of a degree. + Demonstrated experience with forensics tools such as Cellebrite, EnCase, Axiom, XRY, Forensic Toolkit (FTK), and… more