- Burns & McDonnell (Washington, DC)
- …of network penetration testing, web application security testing, cybersecurity vulnerability assessments, secure system design and integration, and/or development ... alterations to address these issues. + Assist in penetration testing and vulnerability assessments of IT and Operational Technology (OT) networks for both compliance… more
- Cisco (Washington, DC)
- …in threat intelligence, cybersecurity, or security operations. + Expertise in vulnerability management, threat modeling, and security risk assessment . + ... The ASM service unifies tooling sources of truth, mis-configurations, and vulnerability data collected to enable executive accountability and track the prioritized… more
- Abbott (San Diego, CA)
- …devices. Your work will code, support threat modeling, risk assessments, vulnerability management, and regulatory compliance, and also ensure our products are ... and operating system hardening. + Assist with penetration testing and vulnerability assessments of firmware, hardware interfaces, and software components. + Help… more
- MIT Lincoln Laboratory (Lexington, MA)
- …approved SSP* Conduct security compliance audits and perform security vulnerability assessments on Laboratory information systems* Establish and maintain ... artifacts such as the Plan of Action & Milestones (POA&M), Risk Assessment Report, and Continuous Monitoring Strategy* Lead and align information technology (IT)… more
- Tactibit Technologies LLC (Suitland, MD)
- …system administrators and operations teams + Monitor and report on vulnerability management program effectiveness including vulnerability scanning and patch ... data calls, audits, and other external requests + Coordinate security assessment efforts including Security Controls Assessments (SCAs), penetration testing, and… more
- RTX Corporation (Fulton, MD)
- …This position is onsite located in Fulton, Maryland. **What You Will Do:** * Vulnerability , Exposure, and Risk Management of systems and technologies, as well as ... assessment of compliance posture to various security controls. *...and reporting of overall cyber-posture of the organization, including vulnerability status and remediation, and staying up to date… more
- ASM Research, An Accenture Federal Services Company (Alexandria, VA)
- …operational risk remains minimal. Moreover, you will be conducting internal vulnerability assessments and coordinating with external entities to facilitate audits. ... (ATO) Packages and supporting documents like System Security Plans (SSPs), Risk Assessment Reports (RARs), Plans of Actions and Milestones (POA&Ms), Security Control… more
- M. C. Dean (District Of Columbia, DC)
- …such as ACAS, NESSUS, SCAP, and STIG Checklists. + Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. + Manage POA&Ms, deviation ... and verification of documentation necessary to complete the DoD RMF assessment and authorization process. . Implement Implementation of DoD Security Technical… more
- The Boeing Company (El Segundo, CA)
- …design and test documentation and artifacts + Assist in conducting Cyber Vulnerability Analysis (CVA) for multiple processing platforms in the satellite vehicle ... design and test documentation and artifacts + Conduct Cyber Vulnerability Analysis (CVA) for multiple processing platforms within the...position you will be required to complete a technical assessment as part of the selection process. Failure to… more
- Capital One (Richmond, VA)
- …applications, including Third Party Cybersecurity framework, program optimization, vulnerability remediation, metrics reporting, performance analysis and mitigation ... controls of a cybersecurity program including qualitative risk analysis steps, vulnerability and patch management, threat modeling, Identity and Access Management… more