, vulnerability, asset, and software management tool output to identify security trends and risks. Support risk mitigation through...Evolver Federal is seeking a Senior Cybersecurity Risk Management Analyst to support its Federal client in Springfield...
Evolver Federal is seeking a Cybersecurity Risk Management Analyst to support its Federal client in Springfield... developing and maintaining cybersecurity policies and procedures. Responsibilities Apply knowledge of NIST 800-53 security...
, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security... while contributing to a high-performing team. Peraton Overview Peraton is a next-generation national security company that drives...
, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security... Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending...
, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security...-performing team. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence...
, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security...-performing team. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence...
intelligence gathering and correlation with internal events. · Participate in security audits, vulnerability assessments.... Job Description Overview The ATPCO Security Operations (SOC) Internship is a 12-week program designed to give college students hands...
8510.01 RMF for DoD IT. - Review and analyze cybersecurity artifacts including System Security Categorization, Security Controls... Vulnerability Identification (CVI) and Adversarial Cybersecurity DT&E (ACD). - Analyze Assured Compliance Assessment Solution (ACAS...
of organizational security policies, through monitoring of vulnerability scanning devices. Work with the Information Assurance Team... of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems...
The Systems Security Engineer utilizes in-depth understanding and experience in current DoD Risk Management Framework..., Platform IT (PIT), and the implementation of Cyber Security and IA boundary defense techniques and various IA-enabled...
, and implement ServiceNow Security Operations (SecOps) solutions that enhance the customer's ability to detect, respond..., and remediate security threats. This hybrid role combines ServiceNow SecOps development, integration engineering, and process...
) environment to document security controls, track authorization status, and maintain continuous monitoring compliance. Advise... competent knowledge of the Risk Management Framework, Computer Network Defense, and Vulnerability Mgmt. Self starter...
. These services are required to address security risk management, compliance with federal privacy laws, information assurance.... Develop and implement security monitoring strategies and procedures to improve the organization's overall security posture...
security, Tanium, acas, hbss, analyst, it technician, cyber security analyst, cyber security specialist, iat level 3, iat level... security, , Vulnerability, Scanning, Secret, Marines, Marine Corps, Quantico, USMCB Quantico, DoD, Navy, Army, Air Force...
Responsibilities Peraton is looking for an Engineering Lead (Flight Safety) to support a national security program... space warfighting mission based in Springfield, VA. As the Engineering Lead (Flight Safety) supporting a national security...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...