- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. The Tech Ops Officer will support the… more
- Nightwing (Lumber Bridge, NC)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Contingent Upon Award of Contract**… more
- Nightwing (Sterling, VA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. We're seeking a skilled **Senior Network… more
- Nightwing (Lumber Bridge, NC)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Contingent Upon Award of Contract**… more
- Nightwing (Fort Lewis, WA)
- …capabilities include cyber space operations, cyber defense and resiliency, vulnerability research , ubiquitous technical surveillance, data intelligence, ... lifecycle mission enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. **Contingent Upon Award of Contract**… more
- Xcellent Technology Solutions (Rolla, MO)
- …national geospatial data that supports everything from disaster response to environmental research and infrastructure planning! This is your chance to join a ... and implementing practical, compliant security controls. + Demonstrated expertise in vulnerability remediation, log analysis and risk assessment in order to monitor,… more
- Ally (Raleigh, NC)
- …areas. * Participate in threat modeling exercises. * Effectively communicate vulnerability details, risks, and potential impacts to, application owners, developers, ... assigned. **The Skills You Bring** Principal Expectations:. * Identify, research , and evaluate current vulnerabilities, provide remediation and configuration… more
- World Wide Technology (Newport Beach, CA)
- …Outcome + Lead the selling strategy creating short and long-term plans based on research and a deep understanding of business and technology trends + Determining the ... compliance, security governance, networks, protocols, threat management, change management, vulnerability management and overall cyber security best practices. +… more
- Fairview Health Services (Minneapolis, MN)
- …and emotional state + Identify factors that impact a child and family's vulnerability to stress and trauma and how children and families interpret and make ... by the organization and the ACLP. + Incorporate evidence-based practice and research into child life practice through continuing education. + Other Professional… more
- CACI International (Chantilly, VA)
- …cyber events and training, such as our Capture the Flag Events, Internal Research and Development opportunities as well as prepaid courses to nationally recognized ... with some of the following: OWASP top 10, DoD and NSA Vulnerability and Penetration Testing Standards.** **Knowledge of exploitation concepts including phishing and… more