- Leidos (Chantilly, VA)
- …of hackers, engineers, makers, and shakers have expe-rience spanning centuries of research , development, and oper-ations missions - across desktop, mobile, IoT, and ... as eMASS, ACAS, Tenable/Nessus, Splunk, ManageEngine, or other compliance and vulnerability scanning tools. + Strong communication and documentation skills. +… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... CVE findings. + Familiarity with working on WIZ or Nessus vulnerability findings, including analysis and automated remediation. **Desired Certifications:** + DoD… more
- General Dynamics Information Technology (Sterling, VA)
- …/ vulnerability management in the Linux construct + Performing research , analysis, and design for all Linux computing systems and network infrastructure ... certification or training, or work/military experience + Experience with DoD vulnerability analysis and Industry Best Business Practices + Hands-on experience with… more
- SAIC (Washington, DC)
- …for Windows servers, Active Directory, remote desktop services, OS vulnerability remediation, Windows Server and workstation patching, hypervisor (VMware, HyperV) ... issues. The candidate will also be responsible for applying new solutions through research and collaboration with team members and will be advising on course of… more
- ARSIEM (Arlington, VA)
- …impact on every client you work with. ARSIEM is looking for a Cybersecurity Vulnerability Analyst who can support the development of new and innovative Cyber Threat ... Intelligence techniques, to be the tip of the spear for Vulnerability Managment's threat intelligence capabilities. This position will support one of our Government… more
- Southern California Edison (Rosemead, CA)
- …Team, you will be primarily responsible for not only conducting continuous research on emerging threats and threat actor activity but also actioning that ... hunt for those across the SCE environment. + Use understanding of Vulnerability Exploitation to Hunt for Evidence of exploitation of emerging vulnerabilities. +… more
- Chenega Corporation (Sierra Vista, AZ)
- …is 100% on-site in a government facility. Responsibilities + Cooperative Vulnerability and Penetration Assessment (CVPA) performed with the objective of identifying ... at a system cyber survivability determination. + Cyber Economic Vulnerability Assessment performed as part of or following an...feel prepared and confident. To help you with your research , we suggest you review the following links: Chenega… more
- Huntington Ingalls Industries (Albuquerque, NM)
- …Command analysis and operations support, Space Force testing and training, and research and development of space systems. As a Sr. Information Systems Security ... secure systems aligned with DoD RMF standards * Lead system accreditation, vulnerability assessments, and insider threat mitigation * Guide junior administrators and… more
- Trace Systems Inc (Shaw AFB, SC)
- …and AOC networks and systems; + Utilize standard software tools to perform vulnerability scans of network equipment and software; and assist network, systems and ... Framework (RMF) artifacts, Plan of Action and Milestones (POA&Ms), waivers, and vulnerability mitigation plans; + Assess the impact of changes on certification and… more
- Tetrad Digital Integrity LLC (Arlington, VA)
- …Ansible, or CloudFormation + Implement automated security tools for vulnerability scanning, static/dynamic application security testing (SAST/DAST), and container ... Policy management + Perform analysis of security posture by reviewing vulnerability and compliance scans and making recommendations for remediations and managing… more