- Jostens (Minneapolis, MN)
- …Provider (MSSP), incident response, endpoint security, email security, vulnerability management, security configuration standards, and related activities. You ... and escalation. + Oversee security incident triage, scope analysis, and impact assessment . + Publish reports and guidance on incident findings for stakeholders. +… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …both the compliance standards and the tools and techniques to assess vulnerabilities. Assessment teams identify risks that may lead to mission loss or degradation ... provide recommendations for risk reduction based on DoD Mission Assurance Assessment benchmarks. ARA teams identify threats to information technology and operational… more
- The Boeing Company (El Segundo, CA)
- …development and integration platforms, executing software testing, and conducting Cyber Vulnerability Analysis (CVA). The candidates will work with flight software ... test documentation and artifacts. * Assist in conducting Cyber Vulnerability Analysis (CVA) for multiple processing platforms in the...position you will be required to complete a technical assessment as part of the selection process. Failure to… more
- COLSA Corporation (Kingsport, TN)
- …support system owners, and lead the documentation, authorization, and ongoing assessment of information systems. Requires working on-site and as needed during ... and maintain all RMF-related documentation including System Security Plans (SSPs), Security Assessment Reports (SARs), Risk Assessment Reports (RARs), and Plan… more
- Applied Research Associates, Inc. (Fort Belvoir, VA)
- …the tools and techniques to assess vulnerabilities to be a part of our team. Assessment teams identify risks that may lead to mission loss or degradation and provide ... for risk reduction and management based on DoD Mission Assurance Assessment benchmarks. Teams identify threats to information technology and operational technology… more
- Manulife (Boston, MA)
- …Analyst** to join our cybersecurity team. This role focuses on ** vulnerability management** , **threat prioritization** , and **risk-based decision-making** to ... Responsibilities:** + Lead the **CTEM lifecycle** , including identification, assessment , prioritization, and help inform remediation tracking and reporting. +… more
- General Dynamics Information Technology (Fort Bragg, NC)
- …handling, incident response, intrusion analysis, threat hunting, digital forensic analysis, vulnerability scanning, Data Loss Prevention (DLP). + Tracks and handles ... with other applications, and minimal impact to the users. + Ensures ACAS vulnerability scanning mechanisms are operational and providing relevant results to the … more
- FirstEnergy (Akron, OH)
- …cyber and information risks as needed + Understand software and system vulnerability processes, manage vulnerability patches through a process lifecycle, and ... identify and assess the severity and potential impact of risks. Communicate risk assessment findings to risk owners outside the cybersecurity program in a way that… more
- Burns & McDonnell (Washington, DC)
- …of network penetration testing, web application security testing, cybersecurity vulnerability assessments, secure system design and integration, and/or development ... alterations to address these issues. + Assist in penetration testing and vulnerability assessments of IT and Operational Technology (OT) networks for both compliance… more
- Cisco (Washington, DC)
- …in threat intelligence, cybersecurity, or security operations. + Expertise in vulnerability management, threat modeling, and security risk assessment . + ... The ASM service unifies tooling sources of truth, mis-configurations, and vulnerability data collected to enable executive accountability and track the prioritized… more