actionable cyber intelligence to support incident response, vulnerability management, and other cybersecurity initiatives... US * * The Opportunity: As a Cyber Threat Intelligence Analyst, you will play a crucial role in identifying and mitigating cyber...
Compliance tool. Analyze vulnerability scans and compliance reports to identify potential security weaknesses and ensure... status reports, which are consistent, well structured, answer to all the assigned management templates guidelines...
, network changes, account and logging level changes. Monitor security level events such as account management, vulnerability... includes: Agency analyst app for general helpdesk assistance and log monitoring. Oracle Investigation app for database...
, network changes, account and logging level changes. Monitor security level events such as account management, vulnerability... includes: Agency analyst app for general helpdesk assistance and log monitoring. Oracle Investigation app for database...
analysis, reverse engineering analysis / characterizations, facility and vulnerability assessments. This includes...-level tasks. Demonstrates in-depth analysis of analytic operations and knowledge management issues across organizational...
: Enterprise Operations & Technology Division's Enterprise BTO Department is looking for a Systems Analyst with strong analytical... administration and integration support for Freddie Mac Web Content Management (WCMS) Platform - Acquia. Additionally, as a systems...
of compliance of required configurations, vulnerability assessments, examination of documentation, conducting manual testing...(s). Conduct vulnerability assessments, and analyze results from ATO assessments, penetration tests, or ad hoc risk assessments...
participate in briefings to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst... Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability Assessment, Intrusion...
to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst may... Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability Assessment, Intrusion...
participate in briefings to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst... number of heterogeneous security devices Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability...
to provide expert guidance on new threats and will act as an escalation point for analysts. The analyst may... number of heterogeneous security devices Expert knowledge in two or more of the following areas related to cybersecurity: Vulnerability...
, Risk Management Framework, IT security, infrastructure, vulnerability assessment, reporting, firewalls, VPN, Data Loss... of Defense, Life Cycle Sustainment Plan, Acquisition Strategy, Simplified Acquisition Management Plan, Level of Repair Analysis...