- TekSynap (Virginia Beach, VA)
- …STIG implementation on DoD systems and applications. + Conduct comprehensive vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) and ... + STIG application and hardening of systems. + Conducting vulnerability scans and analysis using ACAS. + Patch management...and Windows platforms. **Overview** We are seeking a Cybersecurity Engineer III to join our team supporting Department of… more
- TekSynap (Virginia Beach, VA)
- …Implementation Guides (STIGs) to ensure secure configurations. + Conduct vulnerability assessments using the Assured Compliance Assessment Solution (ACAS) tool. ... STIG implementation on operating systems and applications. + Performing vulnerability assessments using ACAS. + Interpreting DoD cybersecurity policies, directives,… more
- TekSynap (Virginia Beach, VA)
- …Technical Implementation Guides (STIGs) to ensure system compliance. + Conduct vulnerability scans using the Assured Compliance Assessment Solution (ACAS) tool. + ... guidelines. + Performing STIG implementations on various platforms. + Running vulnerability assessments using ACAS. + Interpreting and applying DoD security policies… more
- KBR (Beavercreek, OH)
- Title: Information System Security Engineer (ISSE) Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced ... more technologies/skills related to A&A activities + Conduct risk and vulnerability assessments of information systems to identify vulnerabilities, risks, and… more
- Imagine One Technology & Management (Dahlgren, VA)
- …revise system requirements and specifications to meet DoD security policies. + Perform vulnerability tests as Red Team and Blue Team using manual techniques, Assured ... to specific sets of information systems. + Define an Information Assurance Vulnerability Management (IAVM) Plan. Plan, execute and document results of security… more
- Rubrik (Palo Alto, CA)
- …protect Rubrik information. **About the role:** Rubrik is seeking an Application Security Engineer . In this role, you will be responsible for ensuring that Rubrik's ... across SDLC activities such as threat modeling, secure code review, vulnerability management, and penetration testing + Knowledge of regulatory guidelines and… more
- Pacific Northwest National Laboratory (Richland, WA)
- …accreditation. + Supports operational systems and performs activities such as vulnerability scanning, network, and system security configuration, etc. + Design and ... protocols and analysis thereof + Experience with automation of vulnerability detection + Experience with utilizing emerging artificial intelligence technologies… more
- TEKsystems (Naperville, IL)
- …to - endpoint protection; application control; email security; firewalls; vulnerability management; data loss prevention; cloud security services; security ... * Manage firmwide Cybersecurity incident response program management. * Manage vulnerability management program and technology risk management program. * Provide… more
- RTX Corporation (Fulton, MD)
- …position is onsite located in Fulton, Maryland. **What You Will Do:** * Vulnerability , Exposure, and Risk Management of systems and technologies, as well as ... * Documenting and reporting of overall cyber-posture of the organization, including vulnerability status and remediation, and staying up to date or performing… more
- OneMain Financial (Fort Mill, SC)
- …Serve as the technical resource for OneMain patch management and vulnerability remediation efforts across servers, endpoints, network devices, and cloud ... team members. + Drive compliance with SLAs for patch management and vulnerability remediation. + Architect and optimize automated patch deployment pipelines using… more