- Leidos (Annapolis Junction, MD)
- …and latency; setting up firewalls. Responsible for secure infrastructure and vulnerability corrections, data security, compliance, and backups and recovery. Maintain ... SSPs, STE/STN requirements via RMF, Netseer, SEAR logging, patching, IAVMs, McAfee, and UAM. + Responsible for user-level support, including interacting with system-savvy developers and analysts, resolving network, computer, and virtual system issues &… more
- Eliassen Group (Cincinnati, OH)
- …programs throughout the organization . Monitor, support, and report on vulnerability assessments, penetration tests, as well as compliance related solutions . ... Design, set up, and configure various access solutions from remote access VPNs to site-to-site VPNs using diversified security platforms . Perform root cause analysis on security events as needed **Experience Requirements:** . Bachelor's degree with a focus on… more
- Ralliant (Raleigh, NC)
- …designing secure deployment patterns, secretless authentication, and automated vulnerability remediation workflows. + Promote DevSecOps culture through enablement, ... documentation, and best practices. + Develop cloud security standards, security baselines, and operational best practices across multi-cloud environments. + Implement and manage CSPM, CWPP, and CIEM tools to continuously improve cloud security posture and… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Our NIGHTWING group is looking for an Account Executive,… more
- Parsons Corporation (Herndon, VA)
- …the RSEG group + Conducts Analysis of Alternatives, Technology Assessments, Vulnerability Assessments, and various other technology studies as required + ... Collaborates and coordinates with external and internal customers and partners - builds collaborative relationships through effective communications and outreach + Ability to participate in solutions for prototypes and efforts to develop concepts and mission… more
- MyFlorida (Tallahassee, FL)
- …operations. + Participate in cybersecurity efforts including incident response and vulnerability mitigation. + Participate in disaster recovery planning and testing ... to ensure business continuity. + Plan and manage network upgrades, expansions, and modernization initiatives. + Provide proactive and responsive support to end users, addressing incidents and service requests. + Provide Tier II/III technical support for… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. Nightwing is supporting a US Government customer on a large… more
- New York State Civil Service (Albany, NY)
- …documentation during cyber security events; support analysis of risk registers, vulnerability reports, and remediation tracking; * Assist in drafting, updating or ... reviewing OTDA Information Security and Information Technology Policies (OTDA's Administrative Policies and Procedures Manual (APPMs), Standard Operating Procedures (SOPs) and compliance documentation with attorneys and the CISO; * Support training… more
- Truist (Wilson, NC)
- …you will develop custom processes to automate integrations such as storage, vulnerability management, code scanning, etc. into the automation processes used to ... deploy applications. We strive for the best developer experience and the least amount of manual tasks needed for application teams to bring applications online on our platform. **ESSENTIAL DUTIES AND RESPONSIBILITIES** Following is a summary of the essential… more
- CACI International (Crane, IN)
- …sensitive information and systems from cyber threats. This may involve vulnerability assessments, penetration testing, and security protocol development. + Assist in ... the design and development of secure, robust computer systems and applications tailored to meet DOD requirements. This may include working on both hardware and software components. **Qualifications:** _Required:_ + US Citizenship is required with eligibility… more
Recent Jobs
-
HR Specialist II
- ROUSH (Livonia, MI)
-
Principal Engineer - Plant Design
- Bechtel Corporation (Reston, VA)
-
Engineer 01
- IBM (New York, NY)