- Foxhole Technology, Inc (Fort Meade, MD)
- …CySA+, CISM, CASP, CISSP or equivalent). + Strong understanding of vulnerability management principles and security control implementation. + Ability to work ... both independently and collaboratively in a fast paced, mission focused environment. + Strong written and verbal communication skills with experience supporting cross functional team. + Proven ability to lead technical efforts and communicate complex concepts… more
- Lockheed Martin (Stratford, CT)
- …and / or corrective measures have been taken when an incident or vulnerability has been discovered\. * Communicate, implement and manage a formal Information ... Security / Information Systems Security Program together with ISSM and Program Security\. **Basic Qualifications:** * TS Clearance required * DoD 8570 IAT Level II certification or higher * Experience with IS auditing and investigations * Knowledgeable of… more
- Moses/Weitzman Health System (Middletown, CT)
- …social determinants of health like housing insecurity, food insecurity, and economic vulnerability . + Coordinate patient care internally and externally to ensure the ... efficient accomplishment of healthcare and social goals. + Actively participate in all meetings related to Transitions Program and CKP. + Provide dissemination of information internally at CHC and externally at partner agencies and with community collaborators… more
- Tufts Medicine (Melrose, MA)
- …violations of Hospital policy. Take immediate correction action to mitigate the vulnerability or hazard, if possible, and collaborate with other departments to ... either mitigate or resolve, if warranted. Report deficiencies to Supervisor, and document via an incident report or work order for required follow up and resolution. 4. Take proper actions during patient crisis interventions to achieve the safest possible… more
- NVIDIA (Santa Clara, CA)
- …engineering, operations, and security teams. + Enforcing security guidelines, managing vulnerability remediation, and collaborating with security teams on audits and ... assessments. + Maintaining documentation, SOPs, and process improvements to enhance operational maturity. What we need to see: + 8+ years of hands-on experience building/supporting complex services and BS/MS in Computer Science (or equivalent experience). +… more
- Lockheed Martin (Palmdale, CA)
- …2019, Win10, etc\.\) * Experience with RMF / Security, including vulnerability remediation and security management \(system hardening, log management, configuration ... management \(i\.e\., Nessus, McAfee, WSUS, Shavlik, Splunk, SCAP, etc\.\)\) * Ability to lift 30 lbs including carrying up and down stairs * Ability to crouch under desks to connect workstations/peripherals **Desired Skills:** * Ability to obtain technical… more
- Ascension Health (Redlands, CA)
- …something very special. Providing care to all individuals, regardless of wealth, vulnerability , immigration or refugee status, is immensely gratifying. In this work, ... you will be joining others with a similar mission and vision, including the opportunity to volunteer in the community. **Benefits** Paid time off (PTO) Various health insurance options & wellness plans Retirement benefits including employer match plans… more
- Chenega Corporation (Huntsville, AL)
- …monitor corrective actions until all actions are closed. + Perform vulnerability /risk analysis of systems using expertise in relevant information systems security. ... + Track and monitor Plan of Action and Milestones (POA&Ms). + Conduct reviews of cybersecurity artifacts and technical briefings and work with the customer to resolve any findings. + Implement identified security controls and operate them as intended through… more
- KBR (Dayton, OH)
- …to successful Authority to Operate decisions across multiple platforms + Conduct vulnerability and risk assessments + Perform key cybersecurity analyses and use ... technical risk management principles to assess Air Force Platform Information Technology (PIT) systems + Review program documentation (eg, concept, requirements, design, manuals, reports, deficiency/change reports and program schedules) to ensure that… more
- MSys Inc. (Columbia, SC)
- …and Services) + Baseline Configuration Management Deviation Requests + Vulnerability Management + Champion the design, development, implementation, and/or ongoing ... maturation of SCDHHS security and compliance efforts. + Audit and assess internal agency systems as well as business partner/service provider information system security controls. + Utilize Microsoft Office software suite, System Center Service Manager… more
Recent Jobs
-
Warehouse/Delivery (Full Time)
- Compass Group, North America (Clark, NJ)
-
Hardware Exploitation Engineer (TS/SCI)- Senior & Mid
- Vexterra Group (Bethesda, MD)
-
Director, Strategic Accounts
- Evolent (Helena, MT)
-
Principal / Sr. Principal Software Engineer
- Northrop Grumman (Los Angeles, CA)