Delaware Nation Industries (DNI) is on the lookout for a Computer Network Defense Analyst to deliver proactive... in safeguarding the security framework of DoD systems by identifying, analyzing, and addressing cyber threats and vulnerabilities...
changing global security environments, Northrop Grumman brings informed insights and secure technological solutions to enable... security realm of offense, defense, and exploitation. Thought leadership demands nothing less. If you are an expert...
measures have been taken when an incident or vulnerability has been discovered Working with the Facility Security Officer... Continuous upkeep, monitoring, analysis, and response to Information System, network and security events. Maintaining the NIPR...
security testing (e.g., penetration tests, vulnerability scanning, compliance checks) using industry-standard tools... system, ensuring full compliance with FedRAMP Moderate, DoD RMF, and NIST 800-53 standards. Conduct ongoing vulnerability...
security testing (e.g., penetration tests, vulnerability scanning, compliance checks) using industry-standard tools... system, ensuring full compliance with FedRAMP Moderate, DoD RMF, and NIST 800-53 standards. Conduct ongoing vulnerability...
in lieu of degree. Understanding of security architecture, system hardening, vulnerability management, and intrusion... in security architecture, system hardening, vulnerability management, and intrusion detection/prevention Come break things...
documentation, quarterly reviews, and compliance metrics. Supports and tracks systems patch management and vulnerability mitigation... and analyzing data for frequently announced/unannounced physical security inspections on Intrusion Protection System (IPS...
documentation, quarterly reviews, and compliance metrics. Supports and tracks systems patch management and vulnerability mitigation... and analyzing data for frequently announced/unannounced physical security inspections on Intrusion Protection System (IPS...
) environment to document security controls, track authorization status, and maintain continuous monitoring compliance. Advise... competent knowledge of the Risk Management Framework, Computer Network Defense, and Vulnerability Mgmt. Self starter...
of organizational security policies, through monitoring of vulnerability scanning devices. Work with the Information Assurance Team... of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems...
Security Center accounts for Vulnerability Managers to scan devices within ACAS. Assist with remediation/mitigation or make...Watershed Security is seeking a highly skilled and motivated Information Systems Security Engineer to join our team...
POC: Raju Tperson max Vendor rate range: market rate-market rate Job Details: Job title: R&D Site Lab Tech Analyst... Detailed Job Description: Tperson role of tperson R&D Site Lab Tech Analyst is critical for tperson operational success...
with confidence, and proactively manage to secure success. Work You'll Do Review systems to identify potential security... those risks, and maintain a risk registry for escalating and presenting those risks to senior leadership. Provide security...
) Perform system security engineering for naval platforms including secure architecture design Conduct vulnerability scanning...: LogRhythm Platform Administration (LRPA) and Security Analyst (LRSA) certifications CISSP, GCIH, GNFA, or equivalent security...
) Perform system security engineering for naval platforms including secure architecture design Conduct vulnerability scanning...: LogRhythm Platform Administration (LRPA) and Security Analyst (LRSA) certifications CISSP, GCIH, GNFA, or equivalent security...
and customer-oriented Cyber Engineer Lead to join our team in Springfield, VA. The Cyber Security Analyst Lead is responsible..., Internet Protection, Vulnerability Scanning, and Security Information and Event Management (SIEM) tools. Operational Support...
and Analyst Manager, you will: Write comprehensive cybersecurity risk assessments identifying threats & vulnerabilities... knowledge of procedure-based controls of a cybersecurity program including qualitative risk analysis steps, vulnerability...
Celestar Corporation is seeking a Lab Tech Lead to support The U.S. Army Intelligence and Security Command (INSCOM.../firmware extracted from weapon systems for capability and performance characterization as well as vulnerability assessments...
requirements, ensuring alignment with DoD security mandates. Perform vulnerability assessments, support remediation, and manage... Professional-Manager (FITSP-M), GIAC Certified Intrusion Analyst Certification (GCIA), GIAC Cloud Security Automation (GCSA), GIAC...
management. Implement infrastructure and cyber security controls, including enhanced detection and vulnerability capabilities... the mitigation of threats to information systems to safeguard our nation? As a systems security and network security...