- Amentum (Fairbanks, AK)
- …as required in the operations area and mission planning cell after each vulnerability period. + Monitor, collect, analyze, and archive all data required throughout ... the exercise. + Develop, distribute, manage, and collect post-exercise event participant critiques. + Recommend questions/topics based on historical problem areas and/or areas of historically high interest. + Compile, analyze, and summarize critique inputs,… more
- Lockheed Martin (King Of Prussia, PA)
- …* Experience with Active Directory \(AD\) * Experience with vulnerability remediation and security management \(system hardening, log management, configuration ... management \(i\.e\., Nessus, McAfee, WSUS, SCCM, Ivanti, Splunk, ACAS, SCAP, HBSS\) * Experience with software application installation * Experience with TCP/IP, IT security principles, cost estimating **Desired Skills:** * Active Secret or higher clearance *… more
- Highmark Health (Pittsburgh, PA)
- …monitoring activities pertaining to known issues as well as threat and vulnerability scan reporting on applications, networks, operating systems, etc. to identify ... risk. + Monitors current compliance environment including corporate policies and procedures and other rules and regulations through trend and other data analysis.Leads creation and adoption of ad-hoc and other reports pulling data from various sources and/or… more
- ServiceNow, Inc. (San Diego, CA)
- …+ Background working with data logging applications (eg Splunk) + Knowledge of vulnerability scanning tools (Qualys, Nessus) + A defensive security mindset + Ability ... to explain complex issues to executives and customers + GSEC, GCIH, CEH, GCIA or CISSP certifications are a plus For positions in this location, we offer a base pay of $43.04, plus equity (when applicable), variable/incentive compensation and benefits. Sales… more
- Lockheed Martin (King Of Prussia, PA)
- …* Experience with Active Directory \(AD\) * Experience with vulnerability remediation and security management \(system hardening, log management, configuration ... management \(i\.e\., Nessus, McAfee, WSUS, SCCM, Ivanti, Splunk, ACAS, SCAP, HBSS\) * Experience with software application installation, TCP/IP, IT security principles, cost estimating * Ability to obtain and maintain a Top Secret clearance\. **Desired… more
- Lockheed Martin (Hanover, MD)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more
- Lockheed Martin (Hanover, MD)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more
- Lockheed Martin (Hanover, MD)
- …intelligence\. We are hiring for a variety of roles including vulnerability analysts, exploit developers, hardware/software reverse engineers, offensive cyber tool ... developers, embedded developers, and cyber researchers\. We want your expertise in traditional computing \(Windows/Linux/MacOS\), mobile technology \(Android/iOS\), wireless technology, IoT, ICS/SCADA, enterprise technologies, and special\-purpose embedded and… more
- Saint Francis Health System (Tulsa, OK)
- …of intrusion detection and intrusion prevention systems, penetration and vulnerability testing. Knowledge of data loss prevention, anti-virus and anti-malware ... software tools. Knowledge of computer networking, TCP/IP, routing and switching, network protocols and packet analysis tools. Knowledge of Windows, UNIX and Linux operating systems. Excellent problem solving and analytical skills. Excellent written and oral… more
- Guidehouse (Charleston, SC)
- …**:** + Experience with one of the following Cyber Areas: + Vulnerability Analysis + Network Security Monitoring, + Incident Response/Forensics, + Penetration ... Test/Red Teaming. + Hold at least one of the following Certifications: + Information Assurance Management (IAM) + Information Assurance Technical (IAT) + Information Assurance System Architect and Engineer (IASAE) Level I + Personal shall be capable of… more