• Cyber Embedded Software Engineer

    CACI International (Florham Park, NJ)
    …stacks-including signaling, control plane, and data plane components-to support vulnerability discovery. * Perform firmware extraction, binary diffing, static and ... SCI clearance is highly desired. * Experience in cybersecurity research, vulnerability discovery, or exploit development in embedded or telecom environments. *… more
    CACI International (10/28/25)
    - Related Jobs
  • IT Systems Administrator and Security Specialist

    Three Saints Bay (Newport, RI)
    …the systems, which shall be completed as dictated by the severity of the vulnerability based on vulnerability reports provided from scanning tools. + Create, ... modify, and deactivate user accounts and permissions as necessary to maintain access control and ensure that all user accounts are properly managed and authorized, upon notification of a personnel change from the AIMTC leadership + Monitor system performance,… more
    Three Saints Bay (10/28/25)
    - Related Jobs
  • Cyber Security Specialist

    CAE USA INC (Rosebush, MI)
    …audits + Identify cyber security risks and implement security controls. + Vulnerability Management and Threat Detection + Security Event log monitoring + Develop ... governance. + Strong knowledge of security audit, documentation development, vulnerability management and security event monitoring. + Industry certifications like… more
    CAE USA INC (10/28/25)
    - Related Jobs
  • Information Assurance/Security Engineer, Manager…

    OCT Consulting, LLC (Washington, DC)
    …security concepts such as Access Control, Network Security, Cryptography, and Vulnerability Management. Additionally, they must have experience in managing security ... 10+ years of experience with Access Control, Network Security, Cryptography, and Vulnerability Management + 10+ years of experience managing security projects and… more
    OCT Consulting, LLC (10/27/25)
    - Related Jobs
  • Cloud Engineer Senior w/Secret Clearance

    TekSynap (Radford, VA)
    …Bash). + Monitor and enforce compliance with DoD STIGs, IA Vulnerability Management (IAVM), and cybersecurity best practices. + Collaborate with cross-functional ... Defense (DoD) Security Technical Implementation Guides (STIGs) and IA Vulnerability Management (IAVM). + Familiarity with Continuous Integration/Continuous Delivery… more
    TekSynap (10/25/25)
    - Related Jobs
  • Software Engineer

    Nightwing (Annapolis Junction, MD)
    …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... capabilities include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission… more
    Nightwing (10/25/25)
    - Related Jobs
  • Sr Security Operations Consultant - INTL Poland

    Insight Global (San Francisco, CA)
    …attempts, and/or denial of service attacks by conducting continuous monitoring, vulnerability assessments, and log analysis Engage vendors, Infrastructure, IT, GRC, ... exercises Experience with security tools and cloud environments (eg, Vulnerability Scanners, SIEM, SOAR, AWS) Experience with industry frameworks, regulations,… more
    Insight Global (10/25/25)
    - Related Jobs
  • CNO Developer (Baseband)

    Parsons Corporation (Annapolis Junction, MD)
    …difference, and learn from / collaborate with our existing embedded development / vulnerability research (VR) / RE subject matter experts, we have the perfect ... programming language **What Desired Skills You'll Bring:** + Experience with Vulnerability Research **Security Clearance Requirement:** An active Top Secret SCI… more
    Parsons Corporation (10/24/25)
    - Related Jobs
  • Cybersecurity RMF Analyst

    Concurrent Technologies Corporation (HI)
    …network defense assessments, including threat intelligence, Risk identification, vulnerability management, and security operations. + Assess compliance using ... relevant experience in computer network defense, cybersecurity, conducting assessments, and vulnerability scanning using tools like ACAS, Nessus, etc. + Minimum 3+… more
    Concurrent Technologies Corporation (10/24/25)
    - Related Jobs
  • Information Systems Security Engineer - Principal

    Amentum (Fort Meade, MD)
    …IT system Common Vulnerabilities and Exposures (CVEs) and Information Assurance Vulnerability Alerts (IAVAs) * Experience using the MITRE ATT&CK framework to ... Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool * Knowledge of connection security approval processes and… more
    Amentum (10/23/25)
    - Related Jobs