- Red Hat (Boston, MA)
- …products, such as incorporating Red Hat Trusted Profile Analyzer (NIST based assessment for regulatory compliance) and supporting the extension of Red Hat Trusted ... concepts, including security standards, best practices (eg, SLSA), dependency management, vulnerability scanning, signing, provenance, and the use of tools like… more
- Truist (Raleigh, NC)
- …Build relationships with internal clients + Conducts threat modeling and security gap assessment exercises in concert with other teams + Contributes to the creation ... security, access management, end point protection, data loss prevention, vulnerability management, application security, forensics, web security, mainframe, incident… more
- BAE Systems (Mclean, VA)
- …operations, monitoring, analysis, digital media forensics, cyber intelligence, vulnerability assessments, insider threat hunting, data feeds, coordination, ... customer's scope 5 years managing Information Security risks, including full Assessment and Authorization (A&A) process + **Skills:** Possess the appropriate… more
- WEC Energy Group (Milwaukee, WI)
- …Encryption, Masking, Tagging and Governance + Conduct risk assessments and vulnerability analyses to identify and mitigate potential data security threats, including ... third party cyber risk assessment + Collaborate with cross-functional teams to design and deploy data protection measures and best practices + Provide expert… more
- Amentum (Forest Park, GA)
- …interpretation, and preservation of digital evidence in support of network vulnerability mitigation, intelligence operations, and different types of investigations + ... Passport + Must be able to complete and pass a medical assessment per customer requirements Preferred Qualifications + Certifications in relevant exploitation tools… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- …as Cisco Catalyst Center, Cisco ISE, Cisco ACI, and DISA Assured Compliance Assessment Solution (ACAS) will be used. This position is located on Redstone Arsenal, ... or equivalent DoD 8140 certification. + Experience working with system/network vulnerability scanning tools required. + Experience with configuring and maintaining… more
- WEC Energy Group (Milwaukee, WI)
- …to provide timely and actionable intelligence to support incident response, vulnerability management, and other cybersecurity initiatives. + Design, implement and ... and incorporate best practices into daily operations. + Support threat assessment initiatives such as security assessments and penetration testing. + Present… more
- Leidos (Linthicum Heights, MD)
- …other high assurance artifacts/documents for devices undergoing certification and assessment , to ensure devices meet security requirements. Attend and participate ... in relevant security-related meetings and reviews in an effort to translate vulnerability knowledge into guidance to prevent and/or manage risk. Clearly document… more
- CACI International (Annapolis Junction, MD)
- …meet stringent security requirements for processing classified information, performing vulnerability and risk assessments to support security authorization, and ... critical documentation such as System Security Plans (SSPs), Risk Assessment Reports, Certification and Accreditation (C&A) packages, and System Requirements… more
- City of Ames (Ames, IA)
- …implement and maintain secure SCADA networks, including intrusion detection and vulnerability management. Ability to optimize process control systems for efficiency ... consists of an evaluation of education and experience, virtual interview, hiring assessment , on-site interview which will include a manager meeting and written… more