) Develop automated dashboards to visualize cyber risk through cyber “heat maps” Support the design and implementation of the... cyber risk Develop, design, and maintain dashboards and analytics with client-provided tools and integrate with existing...
, and implements cyber applications, secure operating systems, and database products to find secure solutions for enterprise-wide cyber..., and network access. * Performs research and analysis at the deepest levels of total system product to include concept, design...
Professional, Cyber Engineering & Technology Operations job designs, implements and operates the cybersecurity protective..., configuration, problem, and request management. RESEARCH SECURITY NEEDS: Research complex system security needs for operations...
compliance of specified cyber security tools. You'll apply thought leadership to solving complex security challenges in a highly..., and analyze threats. You'll perform hands-on evaluation, implementation, and operation of leading security Cyber defense tools...
compliance of specified cyber security tools. You'll apply thought leadership to solving complex security challenges in a highly..., and analyze threats. You'll perform hands-on evaluation, implementation, and operation of leading security Cyber defense tools...
compliance of specified cyber security tools. You'll apply thought leadership to solving complex security challenges in a highly..., and analyze threats. You'll perform hands-on evaluation, implementation, and operation of leading security Cyber defense tools...
to understand and reduce cyber risk. Our global employees support 65 percent of the Fortune 500, 45 percent of the Global 2000... and compliance auditing software. Your expertise will shine in complex, multi-layered customer environments. Our suite of products...
client trust. In Information Security, we combine risk strategy, digital identity, cyber defense, application security... the incident response process through event escalations Work with Senior level stakeholders (Risk Management, Compliance...
potential risks and develop risk mitigation plans to safeguard the organization against cyber threats and vulnerabilities... evaluating and managing cyber risk and working within industry-standard frameworks (e.g. NIST Cybersecurity Framework, CIS Top 20...
, processes, and technology. Design and deploy risk-driven tests and simulations (or manage a highly-skilled team that does... processes, and detection capabilities, and advise cross-functional teams on security strategy and risk management...
information, operation procedures, mission notes, editing, 508 compliance, documentation, cyber, APT, advanced persistent threat... and Execution, Contract Pay, Vendor Pay, Data Analysis, Machine Learning Engineer, Data Architect, Military Health, Data Operations...
, editing, 508 compliance, documentation, cyber, APT, advanced persistent threat, incident management, incident response..., national guard, data integrator, data scientist, terraform, AWS, Azure, Google Cloud, cloud, migration, consulting, engineer...
with endpoint security, management, and testing tools to do threat hunting, vulnerability detection, risk analysis or compliance..., customer success, and other stakeholders to research product ideas, pain points, obstacles, and market opportunities Using...
to proactively identify risks and vulnerabilities in people, processes, and technology. Design and deploy risk-driven tests... on security strategy and risk management. We are seeking a dedicated vulnerability researcher to engage in advanced...
cycle with a focus on Cyber Security and Risk Management. Ensure products and systems comply with requirements and customer... on an enterprise cyber program in the DC metropolitan area. This hybrid position offers a combination of remote work and periodic...
Recruiter Caitlin Svedberg Job Description BAE Systems is seeking a Network Engineer to support our work... system assessments to validate system compliance with DISA Security Technical Information Guidelines (STIGs) Ensuring system...
of experience working as a Security Engineer 3+ years of IT management or Operations experience managing a team of 3... and compliance; eMASS or similar tool Well rounded security experience with understanding in performing C&A, A&A, Validator or SCA...
concepts, implementation approaches, standards compliance, business and technical tradeoffs, and risk analyses. Review... solutions to mitigate weaknesses and recommendations to meet compliance. Perform complex risk analyses which also include risk...
. is seeking a Zero Trust (ZT) Process Re-Engineer SME, you will provide subject matter expertise in the review and analysis..., white papers, and training) compliance with Cybersecurity mandates, requirements, and best practices; develop report...
deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national... electrical engineer experienced with Project Management to join an engineering organization that designs and delivers leading...