- US Tech Solutions (Bridgeport, WV)
- …using GUI and PowerShell. + Familiar with patch and vulnerability management. + Experience with Microsoft Autopilot. + Intermediate knowledge ... using GUI and PowerShell. + Familiar with patch and vulnerability management. + Experience with Microsoft AutoPilot. + Intermediate knowledge… more
- Precision Resource (Huntington Beach, CA)
- …to ensure timely submission of compliance documentation and audits. + Conduct vulnerability assessments and ensure risk response strategies meet NIST guidelines. + ... and cloud platforms (Office 365, SharePoint). + Hands-on experience with vulnerability scanning, SIEM tools, and incident response. + Strong analytical and… more
- Steampunk (Washington, DC)
- …officials to review evidence and mitigate control deficiencies. + Analyze vulnerability scans, configuration baselines, and penetration test results to determine ... as an Information System Security Officer (ISSO). + Experience with Vulnerability , Configuration, and Asset Management tools in support of Continuous Monitoring.… more
- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …and Hypersonics division. Bowhead seeks analysts to perform Target Vulnerability characterizations and Weapon System effectiveness analyses. The position will ... Model and associated Fail Analysis Logic Trees + Combine the Target Vulnerability models and weapon characterizations to assess encounters between a weapon and… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Foxhole Technology, Inc (Alexandria, VA)
- …and reporting requirements of DoD/DISA IAVM and DHS Information Security Vulnerability Management (ISVM) program utilizing existing processes and procedures to ... and emerging tools. + Support the accessing, analyzing, and reporting of vulnerability remediation data from the Host Based Security System (HBSS), Assured… more
- Foxhole Technology, Inc (Leesburg, VA)
- …role, you will lead a team of penetration testers and vulnerability analysts, ensuring security operations meet mission requirements while strengthening processes, ... **Job Description** + Leada team comprised of Penetration Testers and Vulnerability scanners. + Ensure compliance to Service Level Agreements (SLA), process… more
- CACI International (College Park, MD)
- …and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments. + Designs and implements plans of action ... and milestones to remediate findings from vulnerability and risk assessments. + Provides information assurance for digital information, ensuring its confidentiality,… more
- Themis Insight (Linthicum Heights, MD)
- …the Government, research and evaluate commercial products capable of eliminating the vulnerability or deficiency within the security tool suite. + Conduct analysis ... the Government, research and evaluate commercial products capable of eliminating the vulnerability or deficiency within the security tool suite. + Conduct analysis… more
- BOOZ, ALLEN & HAMILTON, INC. (Riverdale, MD)
- …Manage infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities and improved event correlation in large enterprises. + ... Lead risk and vulnerability assessments in network, system, and application areas, and leverage big data analytics and traditional security event types to identify… more