- KBR (El Segundo, CA)
- …information system security policies, standards, and methodologies + Understanding of vulnerability assessments using the Assured Compliance Assessment Solution ... measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. + During system development advises acquisition program leadership… more
- Guidehouse (Suitland, MD)
- …clients on cyber governance, risk, and compliance, cloud security, FedRAMP, vulnerability management, policy development, authorization and assessment , and risk ... System Security Plan (SSP), Plan of Action & Milestones (POA&M), checklists, Security Assessment Plan (SAP), and other documentation in support of the FedRAMP … more
- Steampunk (Mclean, VA)
- …Strong working knowledge of security controls, security architecture, and security assessment methodologies + Experience with vulnerability management tools and ... documentation including System Security Plans (SSPs), Risk Assessments, and Security Assessment Reports (SARs). + Conducting regular security audits, system … more
- Amentum (Fort Meade, MD)
- …Expertise implementing Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool ... application of security policies * Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities for… more
- Evertec Group, LLC (IA)
- …management tools. Knowledge of static and dynamic code analysis. *Analyzes vulnerability scan results using appropriate scanning tools or platforms to identify ... credentials, performance optimization, agent status, and any other type of vulnerability scanning tool related maintenance. *Recommends and oversees the execution of… more
- Watershed Security (Virginia Beach, VA)
- …STIG assessments to include using SCAP benchmarks and EvaluateSTIG + Performing vulnerability assessments with the Assured Compliance Assessment Solution tool + ... levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and be experienced as an ISSO or… more
- Lockheed Martin (Little Rock Air Force Base, AR)
- …platforms\. Successful candidates will require an understanding of Assured Compliance Assessment Solution \(ACAS\) and vulnerability scanning, development of the ... and other security related processes to include part sanitization procedures, vulnerability scanning, and virus scanning\. The candidate will perform routine… more
- General Dynamics Information Technology (Mclean, VA)
- …NEED TO SUCCEED: + Experience with architecture design, system and network analysis, vulnerability and risk assessments, and security assessment of hardware and ... A CYBER SECURITY ANALYST SR ADVISOR WILL MAKE AN IMPACT + Provide vulnerability analysis and reporting on accredited information systems. + Create documentation such… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …experience **with performing STIG implementation** + Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution ... pre-delivery/in-service ships for integration and modernization efforts + Perform security/ vulnerability assessments using DoD provided tools, reporting results to… more
- Applied Research Associates, Inc. (Raleigh, NC)
- …government security management tools. + Experience in preparation for Security Vulnerability Assessments (SVA), Cyber Operations Readiness Assessment (CORA) and ... regulations and internal policy. + Prepare for and lead DCSA vulnerability assessments, implementing corrective actions and continuous improvement initiatives. +… more