- Citizens (Johnston, RI)
- …tools to perform hunting for complex insider and outsider threats + Analyzing vulnerability assessment and penetration testing results to help identify stealthy ... on the Cyber Defense - Computer Security Incident Response Team (CSIRT) and will be working closely with the...Knowledge and experience required in the areas of security assessment and vulnerability scanning, risk based threat… more
- L3Harris (Greenville, TX)
- …seeking an Information Security Systems Engineer to join our Sensor Infrastructure team . The ideal candidate possesses experience with vulnerability scanning, ... with Xacta or eMASS + In-depth understanding of ACAS (Assured Compliance Assessment Solution) requirements and best practices for vulnerability management and… more
- Leidos (Colorado Springs, CO)
- …security products, ensuring privacy of data throughout its life-cycle, vulnerability management (scanning, assessment , reporting, and mitigation verification), ... **Description** **Join a team committed to a mission!** **At Leidos** ,...and maintain A&A documentation including SSPs, POA&Ms, and Security Assessment Reports. + Champion implementation and validation of NIST… more
- RELX INC (Raleigh, NC)
- …frameworks (FedRAMP, ISO27k, NIST, etc.) + Proven experience in vulnerability management, including identification, assessment , tracking, and remediation ... identification that meets IAL2 (Identity Assurance Level 2) requirements About our team LexisNexis Legal & Professional, which serves customers in more than 150… more
- Battelle Energy Alliance dba Idaho National Laboratory (Idaho Falls, ID)
- …formal methods, or security models to protect government systems. Utilize vulnerability assessment methodologies to the security policies and mechanisms ... work with our Cyber Research and Development department. Our team works a 9x80 schedule located out of our...principles to aid in the analysis, design, development, and assessment of secure computer systems and networks. Apply and/or… more
- Imagine One Technology & Management (Virginia Beach, VA)
- …with performing STIG implementation + Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution ... Remediating open Vulnerabilities + Collaborating with architects and system administrators' vulnerability mitigations and writing to those mitigations in the Plan of… more
- M. C. Dean (District Of Columbia, DC)
- …such as ACAS, NESSUS, SCAP, and STIG Checklists. + Conduct and remediate vulnerability scans; follow DISA STIGs and IAVA compliance. + Manage POA&Ms, deviation ... and verification of documentation necessary to complete the DoD RMF assessment and authorization process. . Implement Implementation of DoD Security Technical… more
- CGI Technologies and Solutions, Inc. (Washington, DC)
- …Security Controls: Knowledge of various security controls and their implementation. Vulnerability Assessment : Experience with vulnerability scanning tools ... Risk Assessment and Management: They conduct regular security audits, vulnerability assessments, and risk analyses to identify potential threats and weaknesses.… more
- Link Solutions Inc (Aberdeen Proving Ground, MD)
- …Link Solutions is seeking a Cybersecurity Information System Security Officer (ISSO) to join our team in Aberdeen Proving Ground, MD. + Must be a US Citizen + DoD ... governance, risk, and compliance efforts to ensure DoD compliance. Join a team of dedicated professionals at an industry-leading organization, where you will work… more
- Amentum (Columbia, MD)
- …If so, look no further. Amentum is seeking a **Senior ISSE** to join our team of passionate individuals in **Columbia, MD** . In this role you will support ... security and intelligence mission. As the Senior ISSE on a dynamic team , you will perform technical security assessments of computing environments to identify… more
Recent Jobs
-
Adjunct Faculty - Department of Law & Justice
- Rowan University (Glassboro, NJ)