- Citigroup (Queens, NY)
- …reporting and analysis. + Support identification of potential areas of vulnerability to key stakeholders to help support implementing an appropriate measure ... to mitigate risk. + Regularly review and update risk and controls reporting standards and procedures to ensure their effectiveness and compliance with regulatory requirements. + Support regular updates to senior management and the Board, keeping them informed… more
- Huntington Ingalls Industries (Pocasset, MA)
- …Conducts semi-annual security self-inspections, physical security surveys, and threat/ vulnerability assessments. Including physical security inspections of secure ... rooms and COMSEC. Ensures accuracy of the security clearance data base and document control using the Access Commander database. Interfaces with government customers on security related issues. Ensures individuals stay within scope for current investigations… more
- Nightwing (Sterling, VA)
- …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The DHS's Hunt and Incident Response Team (HIRT) secures… more
- ServiceNow, Inc. (San Diego, CA)
- …+ Background working with data logging applications (eg Splunk) + Knowledge of vulnerability scanning tools (Qualys, Nessus) + A defensive security mindset + Ability ... to explain complex issues to executives and customers + GSEC, GCIH, CEH, GCIA or CISSP certifications are a plus For positions in this location, we offer a base pay of $36.78/hr, plus equity (when applicable), variable/incentive compensation and benefits.… more
- Chimera Enterprises International (Washington, DC)
- …Improvement Planning Matrix's, for best practices, lessons learned, and gap/ vulnerability identification. Basic Qualifications: + Bachelor's degree or equivalent + ... Active Secret Clearance (required) and DHS suitability clearance + Must have greater than 5 years of experience Desired Qualifications: + Active Secret + Knowledge and experience in CBRN material as well as an understanding of the hazards associated with their… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …meet security requirements for processing classified information. Performs vulnerability /risk assessment analysis to support certification and accreditation. ... Provides configuration management (CM) for information system security software, hardware, and firmware. Manages changes to system and assesses the security impact of those changes. Prepares and reviews documentation to include System Security Plans (SSPs),… more
- Vanguard (Malvern, PA)
- …+ Set the Standard: Define best practices for risk assessments, vulnerability management, and secure development processes. Update security standards and close ... gaps before they become threats. + Investigate & Innovate: Analyze complex security incidents, validate controls, and lead special projects that push the boundaries of cybersecurity. + Be the Expert: Stay ahead of industry trends and emerging technologies. Act… more
- Leidos (Alexandria, VA)
- …lieu of degree. + Understanding of security architecture, system hardening, vulnerability management, and intrusion detection/preventio + Proficiency in one or more ... of the following tools: Qmulos, Splunk, ACAS, Axonius, CheckMark, BURP, and HBSS + Understanding of the RMF process, NIST SP 800- 37, NIST SP 800-53, CNSSI 1253 + VMP experience + Strong communication, presentation, and customer service skills **The maximum… more
- Imagine One Technology & Management (Jacksonville, FL)
- …Invest and Response + Intermediate Cyber Core (ICC) + NEC 742A Network Security Vulnerability Technician + NEC H08A Advanced Network Analyst + NEC H10A Basic ... with performing STIG implementation + Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution tool +… more
- CACI International (Aberdeen Proving Ground, MD)
- …on short notice in order to disseminate relevant threat information. + Assist with vulnerability site assessments to inform analyst team about possible use of ... UAS. + Coordinate with national and international intelligence agencies to develop data sharing capability, trend analysis and procedures. + Provide comprehensive technical red-team analysis. + Perform all functional duties independently + Work and live in a… more