- Panasonic North America (Hoffman Estates, IL)
- …+ Influences security design decisions across the application portfolio **Security Assessment and Testing** - Conduct vulnerability assessments and penetration ... 15%-25% for security assessments and industry events + Experience with security assessment tools (Nessus, Snyk, Black duck, Fortify etc.) + Knowledge of network… more
- Sumaria Systems, Inc. (Bedford, MA)
- …AFB. This is a full-time position. Responsibilities + Support system/application Assessment and Authorization (A&A) efforts, to include assessing and guiding the ... unauthorized access to systems, networks, and data. + Conduct risk and vulnerability assessments and inspections of planned and installed information systems to… more
- Amentum (Norfolk, VA)
- …assets (Government Furnished) + Execute test events, including Cooperative Vulnerability Penetration Assessments, Adversarial assessments, and Cyber Tabletops, in ... provided and NAO approved commercial and open-source network cyber assessment tools (eg Core Impact, Nmap, Burp, Metasploit, and...ways to gain access. + Conduct network scouting and vulnerability analyses of systems within a network. + Conduct… more
- NANA Regional Corporation (Washington, DC)
- …professional capable of conducting high-level security assessments, leading vulnerability management activities, and maintaining system accreditation artifacts ... Management Framework (RMF) lifecycle, including categorization, control selection, implementation, assessment , authorization, and continuous monitoring. + Develop, maintain, and… more
- Xcellent Technology Solutions (Rolla, MO)
- …risks, and implementing practical, compliant security controls. + Demonstrated expertise in vulnerability remediation, log analysis and risk assessment in order ... to monitor, analyze, prioritize, and resolve vulnerabilities to maintain system authority to operate (ATO) and ensure mission continuity. + Experience in patch management and verification to ensure systems remain protected against known threats and compliant… more
- Aetos Systems, Inc. (Huntsville, AL)
- …IT policies and controls align with federal cybersecurity standards. + Oversee vulnerability management, incident response, and risk assessment activities. + ... Serve as the primary technical liaison for CMMC audits and external compliance assessments. + Establish continuous monitoring procedures to ensure ongoing CMMC and DFARS compliance. + Direct MSPs on secure configurations and access controls. + Manage security… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …+ Performing STIG assessments to include using SCAP benchmarks + Performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool ... + Using eMASS + Developing Plans of Actions and Milestones (POA&M) entries + Completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity + Communicating risk reduction recommendations to stakeholders… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …experience in mimicking threat behavior + Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution ... tool + Demonstrated experience with performing STIG assessments to include using SCAP benchmarks + Demonstrated experience utilizing packet analyzer tools such as Wireshark and tcpdump + Certifications: CEH or GSEC or Security+ Minimum certification as 541 (or… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …with performing STIG implementation + Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution ... tool + Shall have demonstrated experience configuring Cisco networking devices + Shall have demonstrated experience utilizing packet analyzer tools such as Wireshark and tcpdump + Shall have demonstrated experience troubleshooting network connectivity issues… more
- Leonardo DRS, Inc. (Bridgeton, MO)
- …Bridgeton, MO facility. The selected candidate will be focusing on the security assessment and risk management of IT systems embedded within tactical vehicles. This ... (SP 800-60) through security control selection (SP 800-53), implementation, assessment , authorization, and continuous monitoring. + **Security Assessments:** Lead… more