- Foxhole Technology, Inc (Alexandria, VA)
- …schedule (dot) Audit scans for assessments. + Develop ACAS reports to track the Vulnerability Per Hosts metric using the DOD scoring methodology. + Review and update ... and briefings as needed. + Identify discrepancies found within eMASS and/or vulnerability database of record. **Minimum Requirements** + Minimum seven (7) years IT… more
- Lockheed Martin (Colorado Springs, CO)
- …and verify cyber solutions across the lifecycle\. They conduct cyber risk assessment activities including threat modeling, vulnerability analysis, and analysis ... \(RMF\), DoD 8510\.01 RMF preferred \- Experience conducting threat modeling, vulnerability analysis, and analysis of mitigation solutions \- Experience working with… more
- ITC Defense (Charleston, SC)
- …systems. + Perform system security assessments, risk analyses, and vulnerability management, including remediation tracking. + Coordinate and validate penetration ... System Architect and Engineer (IASAE) Level I + Experience supporting Assessment and Authorization (A&A) activities, including planning, implementation, and ongoing… more
- Wabtec Corporation (Pittsburgh, PA)
- …of five years of information security, risk management, network engineering, vulnerability management, information technology or equivalent experience + 2+ year's ... HTTP/S, etc.) + 2+ year's experience with network security tools (eg, IDS/IPS, vulnerability scanners, SIEM platforms) + Ability to maintain an elevated level of… more
- GovCIO (Alexandria, VA)
- …+ Collect, organize, and maintain artifacts to support audit and assessment activities. + Conduct and document Security Technical Implementation Guide (STIG) ... engineers, and cybersecurity personnel to resolve compliance gaps. + Monitor vulnerability management activities and validate implementation of corrective actions. +… more
- RedTrace Technologies Inc (Fort Belvoir, VA)
- …consulting skills and extensive technical expertise for threat analysis, vulnerability assessments, and persistent penetration testing cyber campaigns. A successful ... and information assurance in support of customer organizations + Provide vulnerability assessments in support of off-site systems, network architecture, policy and… more
- Federal Reserve Bank (Chicago, IL)
- …events, threat landscape and intel gathering, insider risk management, vulnerability management and technical currency coordination, and end-to-end observability of ... includes the following responsibilities: + Manages and maintains the organization's vulnerability management program, including but not limited to: + compiling… more
- Huntington Ingalls Industries (Fort Belvoir, VA)
- …integrated open source, and GOTS/COTS software components. + Will use vulnerability management systems, automated security scanning tools, and system accreditation ... defensible processes where none are prescribed. + Provide security planning, assessment , risk analysis, and risk management support. + Recommend system-level… more
- L3Harris (Waco, TX)
- …accordance with ICD 503, Risk Management Framework (RMF). + Develop Risk Assessment Reports (RAR), System Security Plans (SSP), Security Control Traceability Matrix ... information assurance is included in the design architecture. + Use Vulnerability Scanning Tools to scan target networks/applications and identify weaknesses. Use… more
- BEAT LLC (Linthicum Heights, MD)
- …integrated open source, and GOTS/COTS software components. + Will use vulnerability management systems, automated security scanning tools, and system accreditation ... defensible processes where none are prescribed. + Provide security planning, assessment , risk analysis, and risk management support. + Recommend system-level… more