, Risk Management Framework, IT security, infrastructure, vulnerability assessment, reporting, firewalls, VPN, Data Loss...
Hands-on experience with vulnerability scanning tools (e.g., Rapid 7), SIEM platforms (e.g., Splunk), and endpoint...
Vulnerability Management Controls Automation (ex: Jenkins, Gitlab, CICD pipeline) AWS (Amazon Web Services) Developer Tools...
security controls and implementation PKI implementation STIG compliance and vulnerability management CISSP AWS Certified...
, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network (VPN...
and vulnerability assessments. Ability to research and remain up to date on relevant state/federal laws and industry best practices...
, vulnerability scans, routers, router Internet Protocol (IP) accounting systems (i.e., Cisco NetFlow), Virtual Private Network (VPN...
and vulnerability assessments. Ability to research and remain up to date on relevant state/federal laws and industry best practices...
; Demonstrated experience conducting business impact analysis and vulnerability assessments; Ability to research and stay current...
security findings, research mitigations, and analyze potential security vulnerability related information from a variety...
Experience with NIST 800-53 and implementing Risk Management Framework Understanding of vulnerability assessment tools...
of vulnerability assessment tools like Rapid7 or Nessus Knowledge of User Access Monitoring and Identity Access Management Experience...
of vulnerability assessment tools like Rapid7 or Nessus Knowledge of User Access Monitoring and Identity Access Management Experience...
hardware and architect infrastructure for logging, vulnerability management, and training environments Support onboarding...
, data modeling, and dashboards Exposure to SIEM, vulnerability management tools, and firewalls Experience working...
solutions across classified and unclassified environments. Perform risk assessments, vulnerability scans, and system hardening...
Domain Risk Management (CDRM) guidelines. Participate in system hardening, vulnerability assessments, and Authority...
. Participate in system hardening, vulnerability assessments, and Authority to Operate (ATO) efforts in partnership with ISSOs...
including Intrusion Prevention/Detection Systems, vulnerability scanners, network mapping tools and related infrastructure... Conduct regular vulnerability scans and assessments, prioritize findings based on risk, and track remediation progress...
policies. Perform rigorous cybersecurity testing, including vulnerability scanning, penetration testing, and security control...