• Information Systems Security Manager

    CAE USA INC (Binghamton, NY)
    …determining technical Information Assurance (IA) requirements, conduct cyber risk assessment activities including vulnerability analysis, analysis of mitigation ... solutions and ensure proper security implementation of the Risk Management Framework (RMF). + Develop system documentation for information system authorization, security management, and continuous monitoring of both networked and standalone information… more
    CAE USA INC (11/12/25)
    - Related Jobs
  • Information Systems Security Officers

    SMX (Washington, DC)
    …maintained, reviewed, and updated on a continuous basis + Conduct required IS vulnerability scans according to risk assessment parameters. + Develop Plan of ... Action and Milestones (POAMs) in response to reported security vulnerabilities + Manage the risks to ISs and other FBI assets by coordinating appropriate correction or mitigation actions, and oversee and track the timely completion of (POAMs) + Coordinate… more
    SMX (11/04/25)
    - Related Jobs
  • Senior Cyber Lead Engineer

    SAIC (El Segundo, CA)
    …information system security policies, standards, and methodologies. + Understanding of vulnerability assessments using the Assured Compliance Assessment Solution ... measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. + During system development advises acquisition program leadership… more
    SAIC (12/12/25)
    - Related Jobs
  • Senior Cyber Lead Engineer

    KBR (El Segundo, CA)
    …information system security policies, standards, and methodologies + Understanding of vulnerability assessments using the Assured Compliance Assessment Solution ... measures, in coordination with the ISSM, when a security incident or vulnerability is discovered. + During system development advises acquisition program leadership… more
    KBR (11/25/25)
    - Related Jobs
  • Information System Security Engineer - GRC/FedRAMP…

    Guidehouse (Suitland, MD)
    …clients on cyber governance, risk, and compliance, cloud security, FedRAMP, vulnerability management, policy development, authorization and assessment , and risk ... System Security Plan (SSP), Plan of Action & Milestones (POA&M), checklists, Security Assessment Plan (SAP), and other documentation in support of the FedRAMP … more
    Guidehouse (10/24/25)
    - Related Jobs
  • Cyber Security SME

    Steampunk (Mclean, VA)
    …Strong working knowledge of security controls, security architecture, and security assessment methodologies + Experience with vulnerability management tools and ... documentation including System Security Plans (SSPs), Risk Assessments, and Security Assessment Reports (SARs). + Conducting regular security audits, system … more
    Steampunk (12/11/25)
    - Related Jobs
  • Information Systems Security Engineer - Principal

    Amentum (Fort Meade, MD)
    …Expertise implementing Security Technical Implementation Guides (STIGs) and Assured Compliance Assessment Solution (ACAS) or other vulnerability management tool ... application of security policies * Contribute to the security planning, assessment , risk analysis, risk management, certification, and awareness activities for… more
    Amentum (10/23/25)
    - Related Jobs
  • Cyber Security Specialist

    Evertec Group, LLC (IA)
    …management tools. Knowledge of static and dynamic code analysis. *Analyzes vulnerability scan results using appropriate scanning tools or platforms to identify ... credentials, performance optimization, agent status, and any other type of vulnerability scanning tool related maintenance. *Recommends and oversees the execution of… more
    Evertec Group, LLC (11/22/25)
    - Related Jobs
  • Intel Security Specialist with TS and SCI Eligible

    Watershed Security (Virginia Beach, VA)
    …STIG assessments to include using SCAP benchmarks and EvaluateSTIG + Performing vulnerability assessments with the Assured Compliance Assessment Solution tool + ... levels of an organization, ensuring compliance with published policies; conducting cybersecurity vulnerability and threat analysis; and be experienced as an ISSO or… more
    Watershed Security (12/05/25)
    - Related Jobs
  • Information System Security Officer

    Lockheed Martin (Little Rock Air Force Base, AR)
    …platforms\. Successful candidates will require an understanding of Assured Compliance Assessment Solution \(ACAS\) and vulnerability scanning, development of the ... and other security related processes to include part sanitization procedures, vulnerability scanning, and virus scanning\. The candidate will perform routine… more
    Lockheed Martin (11/25/25)
    - Related Jobs