- CAE USA INC (Binghamton, NY)
- …determining technical Information Assurance (IA) requirements, conduct cyber risk assessment activities including vulnerability analysis, analysis of mitigation ... solutions and ensure proper security implementation of the Risk Management Framework (RMF). + Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information… more
- SMX (Washington, DC)
- …maintained, reviewed, and updated on a continuous basis + Conduct required IS vulnerability scans according to risk assessment parameters. + Develop Plan of ... Action and Milestones (POAMs) in response to reported security vulnerabilities + Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) + Coordinate… more
- SAIC (El Segundo, CA)
- …information system security policies, standards, and methodologies. + Understanding of vulnerability assessments using the Assured Compliance Assessment Solution ... measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. + During system development advises acquisition program leadership… more
- KBR (El Segundo, CA)
- …information system security policies, standards, and methodologies + Understanding of vulnerability assessments using the Assured Compliance Assessment Solution ... measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. + During system development advises acquisition program leadership… more
- Guidehouse (Suitland, MD)
- …clients on cyber governance, risk, and compliance, cloud security, FedRAMP, vulnerability management, policy development, authorization and assessment , and risk ... System Security Plan (SSP), Plan of Action & Milestones (POA&M), checklists, Security Assessment Plan (SAP), and other documentation in support of the FedRAMP … more
- Steampunk (Mclean, VA)
- …Strong working knowledge of security controls, security architecture, and security assessment methodologies + Experience with vulnerability management tools and ... documentation including System Security Plans (SSPs), Risk Assessments, and Security Assessment Reports (SARs). + Conducting regular security audits, system … more
- Amentum (Fort Meade, MD)
- …Expertise implementing Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool ... application of security policies * Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities for… more
- Evertec Group, LLC (IA)
- …management tools. Knowledge of static and dynamic code analysis. *Analyzes vulnerability scan results using appropriate scanning tools or platforms to identify ... credentials, performance optimization, agent status, and any other type of vulnerability scanning tool related maintenance. *Recommends and oversees the execution of… more
- Watershed Security (Virginia Beach, VA)
- …STIG assessments to include using SCAP benchmarks and EvaluateSTIG + Performing vulnerability assessments with the Assured Compliance Assessment Solution tool + ... levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and be experienced as an ISSO or… more
- Lockheed Martin (Little Rock Air Force Base, AR)
- …platforms\. Successful candidates will require an understanding of Assured Compliance Assessment Solution \(ACAS\) and vulnerability scanning, development of the ... and other security related processes to include part sanitization procedures, vulnerability scanning, and virus scanning\. The candidate will perform routine… more