- General Dynamics Information Technology (Washington, DC)
- …and cybersecurity, such as threat intelligence, incident response, risk assessment , and compliance. + Service Improvement Identification: Continuously identify, ... IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.… more
- Guidehouse (Chantilly, VA)
- …such as system security plans, SOPs, audit logs, configuration scans, and vulnerability scans + Evaluating the implementation and effectiveness of IT controls using ... review and understand the results + Summarizing and communicating IT controls assessment results to a variety of client stakeholders, including senior leadership +… more
- American Express (Phoenix, AZ)
- …Control Matrix, CIS Benchmarks, and Kubernetes/EKS security frameworks for gap assessment and remediation. + Broad understanding of IS disciplines including ... Governance, Cyber Threat, Identity & Access, Infrastructure, Endpoint, Vulnerability , Data Protection, Operations, Application, and Incident Response. +… more
- American Express (Phoenix, AZ)
- …Roles + Experience with Cloud Control Matrix and CIS benchmarks for gap assessment + Broad understanding of all IS disciplines including, Governance, Cyber Threat, ... Identity and Access, Infrastructure, Endpoint, Vulnerability , Data Protection, Operations, Application, Incident Response. + Understanding of Information Security… more
- Lockheed Martin (Orlando, FL)
- …and network environment tools and applications, including: SIEM, ESS, DLP, IAM, Vulnerability Scanning, etc\. \- Proven experience in executing security hardening on ... compliance with industry standards\. \- Proven knowledge of the DCSA Assessment and Authorization Process Manual \(DAAPM\), Joint Special Access Program… more
- University of Colorado (Boulder, CO)
- …equity leadership model. Examples of these values include transparency, vulnerability , accountability, mutuality, modesty, love and care, courage, and creativity ... all can thrive. + Providing services to campus leaders (eg, planning, assessment , communications) to help advance the chancellor's priorities. + Build capacity in… more
- Systems Technologies, Inc. (Charleston, SC)
- …networks and information. + Support the development of system security Assessment & Authorization (A&A) submissions. Apply working knowledge of Risk Management ... Support Service (eMASS) and stages of system projects. + Perform threat vulnerability assessments, aid in security test & evaluation, and develop Cybersecurity… more
- The Boeing Company (El Segundo, CA)
- …maintainability, testability, human systems integration, survivability, vulnerability , susceptibility, system security, regulatory, certification, product ... processes, tools, risk, issues, opportunity management and technology readiness assessment processes + Interface with cross-functional teams, senior leadership, and… more
- JPMorgan Chase (Palo Alto, CA)
- …of current cybersecurity principles, processes, and controls, and lead the assessment of new technologies using existing standards and frameworks. + Provide ... stakeholders and senior leaders to recommend business modifications during periods of vulnerability . + Serve as a subject matter expert in cybersecurity architecture… more
- Alaka'ina Foundation Family of Companies (Dayton, OH)
- …Health practices associated with Potable Water Sources, Thermal Stress, Water Vulnerability Assessments, Occupational and Environmental Health Site Assessment ... (OEHSA), Food safety and security, Epidemiology, and Pest and Vector Surveillance. + Experience utilizing AF Bioenvironmental Installation Medical All-hazards Response (IMAHR) 886H instrumentation/equipment. REQUIRED CITIZENSHIP AND CLEARANCE: + Must be a US… more