- Bandwidth (Raleigh, NC)
- …+ Develop and support reusable automation frameworks and APIs for vulnerability data exchange, control testing, and alerting. + Use Infrastructure-as-Code (IaC) ... + Collaborate with the Application Security team on code scanning, vulnerability triage, and secure code‑review automation. Observability, telemetry, and detection… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …Remediating open Vulnerabilities + Collaborating with architects and system administrators' vulnerability mitigations and writing to those mitigations in the Plan of ... with performing STIG implementation + Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool +… more
- Imagine One Technology & Management (Jacksonville, FL)
- …with performing STIG implementation + Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool + ... Shall have demonstrated experience remediating vulnerability findings to include implementing vendor patches on both...Intermediate Cyber Core (ICC) + NEC 742A Network Security Vulnerability Technician + NEC H08A Advanced Network Analyst +… more
- CACI International (Linthicum, MD)
- …experience in managing software patches and tracking IAVA (Information Assurance Vulnerability Alerts) to ensure system security and compliance. + Proficiency in ... efforts. + Expertise in System Authorization, Risk Management Framework (RMF), Vulnerability Management, and Nessus Vulnerability Scanner. Ability to identify,… more
- ASM Research, An Accenture Federal Services Company (Alexandria, VA)
- …operational risk remains minimal. Moreover, you will be conducting internal vulnerability assessments and coordinating with external entities to facilitate audits. ... of maintaining a low operational risk picture + Conduct internal vulnerability assessments and facilitate external Audits + Coordinate security-related tasks and… more
- M. C. Dean (District Of Columbia, DC)
- …such as ACAS, NESSUS, SCAP, and STIG Checklists. + Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. + Manage POA&Ms, deviation ... Information Technology (IT) and Operational Technology (OT) systems. . Conduct vulnerability scanning and document system vulnerabilities. . Work in a team… more
- Pacific Seafood (Clackamas, OR)
- …and ensure secure configuration of all systems 2. Threat Detection & Vulnerability Management: + Leverage and centralize all logging platforms + Conduct proactive ... threat hunting, log analysis and behavioral detection reviews + Perform vulnerability scanning, prioritization, and remediation planning with cross functional teams… more
- Amazon (Seattle, WA)
- …threat scenarios. 6. Participate in and perform security audits, risk analysis, vulnerability testing and security reviews across all elements of projects and ... attack graphs. - Expertise in writing run-books, and complexity analysis, execute vulnerability scans and reviews vulnerability assessment reports. The pay range… more
- Covenant Health Inc. (Knoxville, TN)
- …security solutions, including firewalls, intrusion detection systems, encryption, and vulnerability management tools. + Implement and manage security measures for ... ensuring timely resolution and documentation. + Conduct regular risk assessments and vulnerability scans to identify and mitigate potential threats. + Lead the… more
- The Gleason Works (Rochester, NY)
- …for plant IT teams on security monitoring and incident response best practices Vulnerability & Risk Management + Perform regular vulnerability assessments and ... environments + Knowledge of secure software development practices and vulnerability management Professional Skills + Excellent analytical and problem-solving… more