- CACI International (Florham Park, NJ)
- …stacks-including signaling, control plane, and data plane components-to support vulnerability discovery. * Perform firmware extraction, binary diffing, static and ... SCI clearance is highly desired. * Experience in cybersecurity research, vulnerability discovery, or exploit development in embedded or telecom environments. *… more
- Three Saints Bay (Newport, RI)
- …the systems, which shall be completed as dictated by the severity of the vulnerability based on vulnerability reports provided from scanning tools. + Create, ... modify, and deactivate user accounts and permissions as necessary to maintain access control and ensure that all user accounts are properly managed and authorized, upon notification of a personnel change from the AIMTC leadership + Monitor system performance,… more
- CAE USA INC (Rosebush, MI)
- …audits + Identify cyber security risks and implement security controls. + Vulnerability Management and Threat Detection + Security Event log monitoring + Develop ... governance. + Strong knowledge of security audit, documentation development, vulnerability management and security event monitoring. + Industry certifications like… more
- OCT Consulting, LLC (Washington, DC)
- …security concepts such as Access Control, Network Security, Cryptography, and Vulnerability Management. Additionally, they must have experience in managing security ... 10+ years of experience with Access Control, Network Security, Cryptography, and Vulnerability Management + 10+ years of experience managing security projects and… more
- TekSynap (Radford, VA)
- …Bash). + Monitor and enforce compliance with DoD STIGs, IA Vulnerability Management (IAVM), and cybersecurity best practices. + Collaborate with cross-functional ... Defense (DoD) Security Technical Implementation Guides (STIGs) and IA Vulnerability Management (IAVM). + Familiarity with Continuous Integration/Continuous Delivery… more
- Nightwing (Annapolis Junction, MD)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
- Insight Global (San Francisco, CA)
- …attempts, and/or denial of service attacks by conducting continuous monitoring, vulnerability assessments, and log analysis Engage vendors, Infrastructure, IT, GRC, ... exercises Experience with security tools and cloud environments (eg, Vulnerability Scanners, SIEM, SOAR, AWS) Experience with industry frameworks, regulations,… more
- Parsons Corporation (Annapolis Junction, MD)
- …difference, and learn from / collaborate with our existing embedded development / vulnerability research (VR) / RE subject matter experts, we have the perfect ... programming language **What Desired Skills You'll Bring:** + Experience with Vulnerability Research **Security Clearance Requirement:** An active Top Secret SCI… more
- Concurrent Technologies Corporation (HI)
- …network defense assessments, including threat intelligence, Risk identification, vulnerability management, and security operations. + Assess compliance using ... relevant experience in computer network defense, cybersecurity, conducting assessments, and vulnerability scanning using tools like ACAS, Nessus, etc. + Minimum 3+… more
- Amentum (Fort Meade, MD)
- …IT system Common Vulnerabilities and Exposures (CVEs) and Information Assurance Vulnerability Alerts (IAVAs) * Experience using the MITRE ATT&CK framework to ... Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool * Knowledge of connection security approval processes and… more