- Robert Half Technology (Land O' Lakes, FL)
- …DoD standards, including NIST 800-53 and related frameworks. * Direct Assessment & Authorization activities, continuous monitoring, and system updates to maintain ... network classifications. * Organize cybersecurity readiness efforts, including inspections, vulnerability management campaigns, and risk assessments. * Facilitate pre-inspection… more
- The Metamorphosis Group (Reston, VA)
- …Team shall coordinate engineering projects including performing technical risk assessment , de-conflict implementations, and resolve technical questions or conflicts. ... Protocols to include OSPF, EIGRP, and BGP. 18. Demonstrated experience with vulnerability scanning tools. 19. Demonstrated experience working in Local Area Network… more
- M. C. Dean (Charleston, SC)
- …and verification of documentation necessary to complete the DoD RMF assessment and authorization process + Develop detailed system diagrams and information ... flow diagrams + Conducting vulnerability scanning and document system vulnerabilities using Evaluate-STIG, SCAP compliance checker, STIG Viewer, eMASSter, and other… more
- Leidos (Annapolis Junction, MD)
- …aspects, evaluating security solutions for classified processing, and conducting vulnerability and risk assessments for accreditation. + **Managing configuration and ... security documentation** , including System Security Plans (SSPs), Risk Assessment Reports, Certification & Accreditation (C&A) packages, and System Requirements… more
- Mb Solutions, Inc. (Colorado Springs, CO)
- …to support the CAT mission to develop and execute threat-based CAT assessment plans. Collect requirements management plans and input to post-mission products. d. ... intelligence and participate in cyber tabletop exercises (CTTXs), cooperative vulnerability penetration testing (CVPA), adversarial assessments (AA), control validation… more
- Artera Technologies (Annapolis Junction, MD)
- …security architecture. + 2 years of experience applying security risks assessment methodology to system development, including threat model development, ... vulnerability assessments, and resulting security risk analysis. + A Master's Degree in Computer Science or IT Engineering is desired and may be substituted for 6… more
- Argonne National Laboratory (Lemont, IL)
- …infrastructure science (risk and resilience analysis); intelligence and vulnerability analysis; and emergency and disaster preparedness. NTNS encompasses ... of employment are contingent upon a background check that includes an assessment of criminal conviction history conducted on an individualized and case-by-case… more
- TekSynap (Huntsville, AL)
- …and executive decision-making. + Direct ongoing monitoring and continuous assessment activities, collecting metrics to adjust security strategies and ensure ... Security Representative (ISSR) experts as a service through ISaaS to deliver vulnerability , compliance, and risk management services as part of a cybersecurity… more
- Arena Technical Resources, LLC (Washington, DC)
- …for IL6) for continuous monitoring, logging, and incident response - Conduct vulnerability assessments and implement remediations aligned to NIST 800-53, DoD STIGs, ... gaining an ATO for systems and working the systems through the assessment and authorization process - Experience working with IP networking, networking protocols… more
- Sunrun (CA)
- …software development lifecycle. You will be responsible for driving the identification, assessment , and mitigation of security risks from the initial design phase ... Design, implement, and fine-tune application security controls like SAST/DAST vulnerability scanning andand standardizing secure coding practices. Establish and… more