• Exploitation Analyst - Top Secret Clearance |

    Cambridge International Systems Inc (Norfolk, VA)
    …and Red Team test integration. + Proficiency with exploitation frameworks and vulnerability assessment tools (eg, Metasploit, Cobalt Strike). + Hands on ... + Conduct and lead cyber OT&E-related test events, including cooperative vulnerability and adversarial assessments. + Support the Cyber Survivability Test Planning… more
    Cambridge International Systems Inc (12/04/25)
    - Related Jobs
  • OPTEVFOR - Senior Navy Qualified Validator (RMF-…

    Rigid Tactical (Norfolk, VA)
    …& Validation: Execute and conduct analysis of network and system Assured Compliance Assessment Solution ACAS vulnerability scans or DoD approved tools to ... the RMF process. + Risk Reporting and Guidance: Provide final security assessment support and guidance regarding vulnerability remediation and determination of… more
    Rigid Tactical (11/01/25)
    - Related Jobs
  • IT Manager - Threat Intelligence

    Medtronic (Lafayette, CO)
    …culture of professional growth and cross-functional collaboration as we work together to engineer the extraordinary. In your role, you may work any Medtronic site, ... + Integrate intelligence findings into security operations, incident response, vulnerability management, and risk assessments. + Oversee the development of… more
    Medtronic (12/11/25)
    - Related Jobs
  • Cybersecurity System Administrator - DMV

    M. C. Dean (District Of Columbia, DC)
    …such as ACAS, NESSUS, SCAP, and STIG Checklists. + Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. + Manage POA&Ms, deviation ... and verification of documentation necessary to complete the DoD RMF assessment and authorization process. . Implement Implementation of DoD Security Technical… more
    M. C. Dean (11/26/25)
    - Related Jobs
  • ISSE Senior - with TS/SCI Poly

    Amentum (Columbia, MD)
    …security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and ... security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and… more
    Amentum (10/14/25)
    - Related Jobs
  • Information Systems Security Officer (Onsite)

    BAE Systems (Tucson, AZ)
    …with the Xacta RMF process automation database platform + Experience in vulnerability assessment , control allocation, and risk mitigation + Motivated ... to join our team of professionals as a Cybersecurity Officer/Field Service Engineer . The qualified candidate will be working with the field engineering team… more
    BAE Systems (12/06/25)
    - Related Jobs
  • Principal Software and Security Compliance Audit…

    Medtronic (Minneapolis, MN)
    …of Material (SBOM) development and maintenance for the purposes of vulnerability monitoring. + Possess an understanding of non-probabilistic scoring methodologies ... for security threats like common vulnerability scoring system (CVSS) and apply appropriately. + Document and communicate recommended state-of-the-art regulated… more
    Medtronic (12/16/25)
    - Related Jobs
  • Cyber Security Analyst

    TEKsystems (Bethpage, NY)
    …Cyber security, Information security, Firewall, Arcitc Wolf, siem, azure, cisco, Vulnerability assessment , Vulnerability management, palo alto, juniper, ... systems (IPS), and other security appliances. * Perform regular vulnerability assessments and lead the remediation of identified risks....CCNA, CCNP, azure network engineer associate, log management tools Top Skills Details Cyber… more
    TEKsystems (12/11/25)
    - Related Jobs
  • Navy Qualified Validator (NQV)

    Frontier Technology Inc. (Norfolk, VA)
    …solutions. + Execute and conduct analysis of network and system Assured Compliance Assessment Solution (ACAS) vulnerability scans (or other DoD approved tools) ... applies knowledge of DoD or DoN network architectures and policy toward assessment and identification of vulnerabilities as a means of improving operational security… more
    Frontier Technology Inc. (12/02/25)
    - Related Jobs
  • Sr. Computer Security Researcher

    Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
    …formal methods, or security models to protect government systems. Utilize vulnerability assessment methodologies to the security policies and mechanisms ... and engineering principles to aid in the analysis, design, development, and assessment of secure computer systems and networks. Apply and/or evaluate security… more
    Battelle Energy Alliance dba Idaho National Laboratory (12/10/25)
    - Related Jobs