- Cambridge International Systems Inc (Norfolk, VA)
- …and Red Team test integration. + Proficiency with exploitation frameworks and vulnerability assessment tools (eg, Metasploit, Cobalt Strike). + Hands on ... + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial assessments. + Support the Cyber Survivability Test Planning… more
- Rigid Tactical (Norfolk, VA)
- …& Validation: Execute and conduct analysis of network and system Assured Compliance Assessment Solution ACAS vulnerability scans or DoD approved tools to ... the RMF process. + Risk Reporting and Guidance: Provide final security assessment support and guidance regarding vulnerability remediation and determination of… more
- Medtronic (Lafayette, CO)
- …culture of professional growth and cross-functional collaboration as we work together to engineer the extraordinary. In your role, you may work any Medtronic site, ... + Integrate intelligence findings into security operations, incident response, vulnerability management, and risk assessments. + Oversee the development of… more
- M. C. Dean (District Of Columbia, DC)
- …such as ACAS, NESSUS, SCAP, and STIG Checklists. + Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. + Manage POA&Ms, deviation ... and verification of documentation necessary to complete the DoD RMF assessment and authorization process. . Implement Implementation of DoD Security Technical… more
- Amentum (Columbia, MD)
- …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and… more
- BAE Systems (Tucson, AZ)
- …with the Xacta RMF process automation database platform + Experience in vulnerability assessment , control allocation, and risk mitigation + Motivated ... to join our team of professionals as a Cybersecurity Officer/Field Service Engineer . The qualified candidate will be working with the field engineering team… more
- Medtronic (Minneapolis, MN)
- …of Material (SBOM) development and maintenance for the purposes of vulnerability monitoring. + Possess an understanding of non-probabilistic scoring methodologies ... for security threats like common vulnerability scoring system (CVSS) and apply appropriately. + Document and communicate recommended state-of-the-art regulated… more
- TEKsystems (Bethpage, NY)
- …Cyber security, Information security, Firewall, Arcitc Wolf, siem, azure, cisco, Vulnerability assessment , Vulnerability management, palo alto, juniper, ... systems (IPS), and other security appliances. * Perform regular vulnerability assessments and lead the remediation of identified risks....CCNA, CCNP, azure network engineer associate, log management tools Top Skills Details Cyber… more
- Frontier Technology Inc. (Norfolk, VA)
- …solutions. + Execute and conduct analysis of network and system Assured Compliance Assessment Solution (ACAS) vulnerability scans (or other DoD approved tools) ... applies knowledge of DoD or DoN network architectures and policy toward assessment and identification of vulnerabilities as a means of improving operational security… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …formal methods, or security models to protect government systems. Utilize vulnerability assessment methodologies to the security policies and mechanisms ... and engineering principles to aid in the analysis, design, development, and assessment of secure computer systems and networks. Apply and/or evaluate security… more