- Oneida Technical Solutions (Colorado Springs, CO)
- …response support, POND support, compliance and review, network health impact, assessment support, working group support, vulnerability management refinement, ... proxy servers, email controls, anonymizing technology, data loss prevention, vulnerability scanners, Endpoint Detection and Response (EDR) and SIEM (Splunk).… more
- Bank of America (Denver, CO)
- …and technology groups to remediate GIS issues showing red or amber on the vulnerability remediation dashboard + Coordinate and drive remediation of ad hoc GIS issues ... Security controls and risks. + Understanding of the concepts of vulnerability management and associated monitoring solutions and practices + Experience of… more
- BOOZ, ALLEN & HAMILTON, INC. (Lexington, MA)
- …Select, tailor, and implement NIST SP 800-53 security controls in support of RMF Assessment and Authorization ( A & A ) requirements. Develop layered protections and ... on how to build secure sof tware, running security vulnerability scans, specifically with the DoD's Assured Compliance and... scans, specifically with the DoD's Assured Compliance and Assessment Solution ( ACAS ) while generating and interpreting… more
- The Boeing Company (Everett, WA)
- …applications + Integrate DevSecOps tools to automate security checks and vulnerability assessments within the CI/CD pipeline + Collaborate with cross-functional ... etc.) + Experience in integrating security tools like SAST, DAST, and vulnerability scanners into CI/CD pipelines + Experience with Infrastructure as code (eg,… more
- Oracle (Richmond, VA)
- …to customers. The Offensive Security group performs security assessments, vulnerability research, static and dynamic analysis research, penetration testing, ... with existing services + Guide security projects beyond the scope of performing assessment work + Identify and disclose vulnerabilities to 3rd party vendors + Design… more
- The Boeing Company (Oklahoma City, OK)
- …maintainability, testability, human systems integration, survivability, vulnerability , susceptibility, system security, regulatory, certification, product ... processes, tools, risk, issues, opportunity management, and technology readiness assessment processes. + Resolves cross-functional technical issues. **Lead (Level… more
- Foxhole Technology, Inc (Alexandria, VA)
- …and reporting requirements of DoD/DISA IAVM and DHS Information Security Vulnerability Management (ISVM) program utilizing existing processes and procedures to ... compliance statistics of vulnerabilities on assets in the Assured Compliance Assessment Solution (ACAS), Tanium, and Continuum portals and maintain asset management… more
- Medtronic (Lafayette, CO)
- …OT, ICS, IoT, and enterprise security processes / standards + **Risk Assessment -** Systematically perform threat modeling, security risk evaluations, and ... vulnerability assessments to highlight and mitigate potential security threats...NIST, IEC 60601-4-5, IEC 81001-5-1, and others. + **Vendor Assessment ** - Evaluate third-party vendors and suppliers for their… more
- INTECON (Bellevue, NE)
- …motivated Cybersecurity (RMF/IA) Analyst to provide Cybersecurity & Cyber Operational Readiness Assessment (C&CORA) support to the 557th Weather Wing (WW) at Offutt ... all steps of the RMF process (Categorization, Selection, Implementation, Assessment , Authorization, and Monitoring). + Ensure documentation accuracy and traceability… more
- AbbVie (North Chicago, IL)
- …and security of participants, executives, and assets through proactive threat assessment and development of resilient event security architectures. The position ... compliant events while systematically mitigating risks using a Special Event Assessment Rating (SEAR)-inspired event risk rating framework. Responsibilities + Direct… more