- Alight (Chicago, IL)
- …controls for AI systems, including access management, data protection, vulnerability scanning, and incident response protocols. + **Workflow Integration:** Build ... workflows. + Deep understanding of cybersecurity principles, threat modeling, vulnerability management, and incident response. + Familiarity with regulatory… more
- Amentum (Columbia, MD)
- …protocols, operating systems, architectures, equipment, services, and standards. + Perform vulnerability and penetration testing using a wide variety of tools + ... network and application-level testing using established testing protocols andMethods + Perform vulnerability and penetration testing using a wide variety of tools +… more
- BEAT LLC (San Antonio, TX)
- …and audit readiness. Audit and assess the effectiveness of vulnerability management activities, including ACAS/eMASS asset tracking, credentialed scanning, and ... progress, and residual vulnerabilities. Collaborate with IA Control Assessors, Vulnerability Analysts, and Systems Administrators to align audit findings with… more
- Amentum (Crane, IN)
- …and institute protective or corrective measures when a security incident or vulnerability is discovered. + Report in conjunction with the User Representative (UR) ... Oversee the application of Security Technical Implementation Guides (STIGs) and ensure vulnerability scans are completed in a timely manner. + Evaluate performer… more
- Oracle (Richmond, VA)
- …to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, ... relative to the industry. **Qualifications** + 6+ years of experience in vulnerability discovery / security engineering / application security + Threat modeling… more
- Leidos (VA)
- …CI/CD pipelines (DevSecOps workflows) to enable automated security testing, vulnerability scanning, and compliance validation. + **Automation:** Define, enforce, and ... + **Threat & Risk Management:** Lead comprehensive threat modeling and vulnerability management efforts. Conduct thorough Security Impact Analyses (SIAs) and risk… more
- Robert Half Technology (St. Louis, MO)
- …their impact and coordinate incident response efforts. + Conduct threat and vulnerability assessments, performing regular system scans and risk analyses. + Support ... network and endpoint security tools such as SIEM, firewalls, IDS/IPS, and vulnerability scanners. + Understanding of security frameworks and regulations (eg, NIST,… more
- Guidehouse (Mclean, VA)
- …Guides (STIGs) and Security Requirements Guides (SRGs). + Conduct full-scope vulnerability assessments and penetration testing of new and modified applications, ... Experience analyzing, assessing, and implementing corrective actions based on vulnerability management and penetration testing. + Experience supporting DoD defensive… more
- Steampunk (Washington, DC)
- …officials to review evidence and mitigate control deficiencies. + Analyze vulnerability scans, configuration baselines, and penetration test results to determine ... as an Information System Security Officer (ISSO). + Experience with Vulnerability , Configuration, and Asset Management tools in support of Continuous Monitoring.… more
- City of New York (New York, NY)
- …with Annual Performance Report (APR). - Evaluation and monitoring of the Vulnerability Index (utilizes data from multiple and complex electronic medical record ... that they are appropriately prioritized for referral to supportive housing. The Vulnerability Index is required to be periodically evaluated for effectiveness and to… more