- SAIC (Honolulu, HI)
- …personnel with knowledge in DoD security hardening, collection, and assessment tools (includes: Security Technical Implementation Guide (STIGs); Assured Compliance ... Assessment Solution (ACAS) SCAP; Nessus; or other currently Government-approved...for the Army regarding RMF. + Ability to conduct vulnerability assessments and monitor networks to support test and… more
- Alaka'ina Foundation Family of Companies (Kauai County, HI)
- …for implementing the DoDI 8510.01 Risk Management Framework (RMF), supporting Assessment and Authorization (A&A) processes, and ensuring the security posture of ... Framework (RMF) for DoD Information Systems and assist in implementing DoD Assessment and Authorization (A&A) procedures. + Manage and respond to security events… more
- WestCare Foundation (Stockton, CA)
- …for providing outreach as necessary including Point in Time Surveys, Vulnerability Surveys and Homeless Encampment closures. Persons in this position will ... part of an outreach team using the Housing First Model and comprehensive centralized assessment system. Essential Job Functions: + Serve as an active part of the San… more
- Artera Technologies (Annapolis Junction, MD)
- …design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system ... and interface standards, developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis. +… more
- Steampunk (Mclean, VA)
- …that systems are safe and secure against cybersecurity threats through risk assessment , threat modeling, and compliance with industry standards (eg NIST, ISO 27011, ... and developing updates and 'fixes' + Automate security processes such as vulnerability management and patch management + Working with software developers and… more
- M. C. Dean (District Of Columbia, DC)
- …and verification of documentation necessary to complete the DoD RMF assessment and authorization process. . Implement Implementation of DoD Security Technical ... Information Technology (IT) and Operational Technology (OT) systems. . Conduct vulnerability scanning and document system vulnerabilities. . Work in a team… more
- BOOZ, ALLEN & HAMILTON, INC. (Lexington Park, MD)
- …gather technical and personnel details from subject matter experts to help with the assessment of the entire threat landscape. You'll learn how to guide your client ... Content Automation Protocol ( SCAP ) , Assured Compliance Assessment Solution ( ACAS ) , Ports, Protocols, and...( ACAS ) , Ports, Protocols, and Services Matrix, Vulnerability Remediation Asset Manager ( VRAM ) , and… more
- KBR (Beavercreek, OH)
- …prevention methods, incident response and management methods, auditing, vulnerability management support, and system security documentation. Key Responsibilities: ... + Coordinating, executing, and managing cybersecurity assessment & authorization (A&A) related activities supporting IT hardware, software, and connectivity… more
- SOS International LLC (Tampa, FL)
- …Assemble tactical level HDBT Facility Characterizations, GEOINT Chronologies, Physical Vulnerability Assessments, and Joint Target Intelligence Materials in support ... produce required graphics. + Perform targeting analysis to accomplish battle damage assessment (BDA), produce BDA. + Conduct hard and deeply buried target analysis… more
- Cardinal Health (Salt Lake City, UT)
- …and promote a unified approach to data protection. + **Threat and Vulnerability Management:** Stay up-to-date on the latest security threats, vulnerabilities, and ... NIST, GDPR, HIPAA, SOX, and PCI DSS. + Proven experience with risk assessment methodologies and frameworks, including risk assessment and management, and… more