- Frontier Technology Inc. (Norfolk, VA)
- …solutions. + Execute and conduct analysis of network and system Assured Compliance Assessment Solution (ACAS) vulnerability scans (or other DoD approved tools) ... applies knowledge of DoD or DoN network architectures and policy toward assessment and identification of vulnerabilities as a means of improving operational security… more
- Zones LLC (Richmond, VA)
- …+ Participating in compliance activities including corporate audit, security risk assessment , and vulnerability remediation. + Managing any Service Requests ... (eg, desktop, mobile) which require local interaction at the supported Locations. + Resolve Incidents and Problems associated with EUC Equipment and EUC Software, and provide break/fix support What you will bring to the team: + Ability to prioritize tasks and… more
- Lockheed Martin (Mount Laurel, NJ)
- …analysis * Strong understanding of cybersecurity principles, including threat modeling, risk assessment , and vulnerability management\. * Ability to obtain and ... maintain a DoD government security clearance at the Secret level\(US citizenship is required\)\. * This position requires a Sec\+ or similar certification\. **Desired Skills:** * Advanced degree in Computer Science, Cybersecurity, or related field\. *… more
- RTX Corporation (Pelham, NH)
- …Unity, and NVIDIA GPU virtualization (NLS, DLS). + Proficiency with monitoring, vulnerability scanning, and compliance assessment tools (ACAS, Splunk, Nessus, ... SCAP, STIG, Nagios, SolarWinds) and working knowledge of security frameworks (CMMC, NISPOM, JAFAN, JSIG, DFARS, DoD RMF). **What We Offer:** Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX we… more
- RTX Corporation (El Segundo, CA)
- …(eg, NetApp) and virtual desktop infrastructure + Proficiency with monitoring, vulnerability scanning, and compliance assessment tools (ACAS, Splunk, Nessus, ... SCAP, STIG, Nagios, SolarWinds) and working knowledge of security frameworks (CMMC, NISPOM, JAFAN, JSIG, DFARS, DoD RMF). **What We Offer** **:** Our values drive our actions, behaviors, and performance with a vision for a safer, more connected world. At RTX… more
- Cognizant (Alpharetta, GA)
- …infrastructure adhere to security policies and compliance standards, including risk assessment and vulnerability management. Salary and Other Compensation: ... Applications will be accepted until January 6, 2026. The annual salary for this position is between $81,337 - $141,000 depending on experience and other qualifications of the successful candidate. This position is also eligible for Cognizant's discretionary… more
- EPS Corporation (Dahlgren, VA)
- …candidate will possess a strong background in system security engineering, vulnerability management, and risk assessment , with hands-on experience supporting ... accreditation and audit processes. Requirements + Performvulnerability assessmentsandrisk analyseson networked systems, applications, and devices to ensure compliance with DoD cybersecurity standards. + Conductvirus and malware scans, identifying and… more
- Savannah River Mission Completion (Aiken, SC)
- …servers, networks, applications, etc. The selected intern will support: * Conducting risk assessment and vulnerability analysis using tools like Nessus, etc. * ... Performing field validation and supporting penetration testing results. * Running system scans and generating reports using tools like Nessus, Splunk, Microsoft Defender to include artificial intelligence (AI) machine learning, etc. * Implementation of… more
- BD (Becton, Dickinson and Company) (Durham, NC)
- …product releases, as well as driving program activities (eg, threat modeling, vulnerability scanning and remediation, risk assessment , incident response). **Role ... execution of security work including architecture analysis & reviews, threat assessment & modeling, implementing security technologies, security vulnerability … more
- KBR (Clearfield, UT)
- …for avionics and mission systems. + Strong understanding of risk assessment methodologies and vulnerability management. Preferred Qualifications: + Active ... (RMF), including: + System Security Plan (SSP) + Architecture Analysis Report + Risk Assessment Report + Plan of Action & Milestones (POA&M) + Authority to Operate… more