• Lead Security Assessor

    Foxhole Technology, Inc (Alexandria, VA)
    …schedule (dot) Audit scans for assessments. + Develop ACAS reports to track the Vulnerability Per Hosts metric using the DOD scoring methodology. + Review and update ... and briefings as needed. + Identify discrepancies found within eMASS and/or vulnerability database of record. **Minimum Requirements** + Minimum seven (7) years IT… more
    Foxhole Technology, Inc (12/19/25)
    - Related Jobs
  • Cybersecurity System Engineer

    Lockheed Martin (Colorado Springs, CO)
    …and verify cyber solutions across the lifecycle\. They conduct cyber risk assessment activities including threat modeling, vulnerability analysis, and analysis ... \(RMF\), DoD 8510\.01 RMF preferred \- Experience conducting threat modeling, vulnerability analysis, and analysis of mitigation solutions \- Experience working with… more
    Lockheed Martin (12/18/25)
    - Related Jobs
  • Cyber Engineer III

    ITC Defense (Charleston, SC)
    …systems. + Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking. + Coordinate and validate penetration ... System Architect and Engineer (IASAE) Level I + Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing… more
    ITC Defense (12/17/25)
    - Related Jobs
  • Senior Cybersecurity Engineer

    Wabtec Corporation (Pittsburgh, PA)
    …of five years of information security, risk management, network engineering, vulnerability management, information technology or equivalent experience + 2+ year's ... HTTP/S, etc.) + 2+ year's experience with network security tools (eg, IDS/IPS, vulnerability scanners, SIEM platforms) + Ability to maintain an elevated level of… more
    Wabtec Corporation (12/17/25)
    - Related Jobs
  • Systems Engineer Journeyman

    GovCIO (Alexandria, VA)
    …+ Collect, organize, and maintain artifacts to support audit and assessment activities. + Conduct and document Security Technical Implementation Guide (STIG) ... engineers, and cybersecurity personnel to resolve compliance gaps. + Monitor vulnerability management activities and validate implementation of corrective actions. +… more
    GovCIO (12/16/25)
    - Related Jobs
  • Red Team Operator (Computer Exploitation Engineer)…

    RedTrace Technologies Inc (Fort Belvoir, VA)
    …consulting skills and extensive technical expertise for threat analysis, vulnerability assessments, and persistent penetration testing cyber campaigns. A successful ... and information assurance in support of customer organizations + Provide vulnerability assessments in support of off-site systems, network architecture, policy and… more
    RedTrace Technologies Inc (12/16/25)
    - Related Jobs
  • Senior Information Security Engineer

    Federal Reserve Bank (Chicago, IL)
    …events, threat landscape and intel gathering, insider risk management, vulnerability management and technical currency coordination, and end-to-end observability of ... includes the following responsibilities: + Manages and maintains the organization's vulnerability management program, including but not limited to: + compiling… more
    Federal Reserve Bank (12/12/25)
    - Related Jobs
  • Security Engineer/Architect (Hybrid)

    Huntington Ingalls Industries (Fort Belvoir, VA)
    …integrated open source, and GOTS/COTS software components. + Will use vulnerability management systems, automated security scanning tools, and system accreditation ... defensible processes where none are prescribed. + Provide security planning, assessment , risk analysis, and risk management support. + Recommend system-level… more
    Huntington Ingalls Industries (12/12/25)
    - Related Jobs
  • Specialist, Information Security Systems Engineer

    L3Harris (Waco, TX)
    …accordance with ICD 503, Risk Management Framework (RMF). + Develop Risk Assessment Reports (RAR), System Security Plans (SSP), Security Control Traceability Matrix ... information assurance is included in the design architecture. + Use Vulnerability Scanning Tools to scan target networks/applications and identify weaknesses. Use… more
    L3Harris (12/12/25)
    - Related Jobs
  • Information System Security Engineer (ISSE)

    BEAT LLC (Linthicum Heights, MD)
    …integrated open source, and GOTS/COTS software components. + Will use vulnerability management systems, automated security scanning tools, and system accreditation ... defensible processes where none are prescribed. + Provide security planning, assessment , risk analysis, and risk management support. + Recommend system-level… more
    BEAT LLC (12/09/25)
    - Related Jobs