- COMSO, Inc (Columbia, MD)
- …patching processes and organizational SOPs. + Utilize Nessus for vulnerability scanning, including agent configuration, connectivity checks, and unlink/relink ... (CMD)-these are essential tools for daily operations. + Perform Nessus vulnerability scanning, including Nessus Agent scans, usage, verifying agent connectivity, and… more
- Lockheed Martin (King Of Prussia, PA)
- …\(e\.g\., DCSA\) for approvals and the ability to perform risk and vulnerability assessments in line with current regulatory guidelines such as DCSA Assessment ... and Security Agency \(DCSA\) authorization of systems to include vulnerability scanning tools \(e\.g\., Tenable\), and endpoint protection tools \(e\.g\.,… more
- Chenega Corporation (Arlington, VA)
- …Equivalent + Three (3) - five (5) years' experience in conducting vulnerability assessment for a wide-variety of mission critical infrastructure to include network ... of foreign Intelligence Collection against US Personnel. + Understanding of vulnerability assessment fundamentals and principles. Chenega Corporation and family of… more
- Nightwing (Pensacola, FL)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Lockheed Martin (Grand Prairie, TX)
- …+ Witness cyber inspections, scans, image builds, threat detections, vulnerability scans, assessments and testing\. + Collaborate with Cyber Engineering, ... \- Knowledge of Cybersecurity and/or Anti\-tamper including system design and vulnerability assessment\. \- Knowledge of security protocol design and analysis \-… more
- Nightwing (Palm Bay, FL)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... challenges. The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system… more
- Amazon (Seattle, WA)
- …following skill(s): Red Teaming; secure software development; application vulnerability identification or assessment; technical writing; penetration testing; code ... the following skill(s): Red Teaming; secure software development; application vulnerability identification or assessment; technical writing; penetration testing; code… more
- Lockheed Martin (King Of Prussia, PA)
- …and other IT\-related concerns\. * Cybersecurity Expertise: Conduct environmental vulnerability scans, remediate vulnerabilities, and perform system hardening to ... Security Technical Implementation Guide \(STIG\) processes * Experience with vulnerability remediation and security management \(i\.e\., system hardening, log… more
- Oracle (Burlington, MA)
- …image signing and secure update/rollback, TPM/ROT integration, SPDM attestation, vulnerability remediation (CVE), and hardening. + Collaborate with platform, ... features in BMC environments: secure/verified boot, firmware signing, TPM/ROT, SPDM, vulnerability management, and hardening at scale. + EDKII/BIOS collaboration and… more
- Oracle (Boston, MA)
- …a variety of work ranging from cloud security, application security, vulnerability analysis, threat modeling, and hacking/enterprise network penetration. The biggest ... (compute, storage, networking) + Perform architectural reviews, penetration testing, vulnerability analysis of compute infrastructure hardware such as o Servers… more