and is responsible for performing vulnerability management, penetration testing, and analysis to reduce the DOE-SR attack surface...Overview: The Senior Cyber Security Analyst provides cyber security support for the Enterprise Information Services...
POSITION OVERVIEW: The IT Security Analyst II position applies mid-level principles and moderate to highly complex... position focuses on offensive security tasks such as penetration testing, vulnerability assessments, and red teaming exercises...
McIntire Solutions is seeking a motivated, career and customer-oriented Cyber Security Analyst, Incident Response..., urgency, and potential impact; identify the specific vulnerability and make recommendations which enable expeditious...
Information Security Analyst Redstone Arsenal/Huntsville, AL IPTA's Technology Solutions Team is passionate... expertise is required to support all levels of Risk Management Framework (RMF) Accreditation. Candidate will need...
where the MPCO IS are dependent on them. Ensure good cybersecurity and vulnerability management practices are developed... design management control of build processes for servers, services, and end points. Comply with hosting facility ATOs...
Management Framework (RMF) Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions...: Cybersecurity, Information Assurance, Plan of Action and Milestones (POA&M), Risk Management Framework Certifications: None...
, NIST CSF-171, SOC1 II, etc. Perform annual risk assessment and monitor the progress of remediation efforts Perform... matrix, and the risk register Support the management of security documentation such as policies, standards, processes...
Must have active IAT II certification (Security+ CE, GIAC Security Essentials Certification (GSEC), CySa+, CEH, CISM, etc.) Working..., Phishing, Ransomware, Social Engineering, Trojan, Vulnerability, Zero-Day Exploit, Advanced Persistent Threat (APT...
assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance... supporting information assurance guidelines and customer requirements. Perform vulnerability/risk analyses of computer systems...
School Diploma or equivalent with 9 years of experience is required Must have a DoD 8570 IAM level II (or higher) security... of classified systems and Risk Management Framework Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system...
such as compliance audits and active evaluations such as vulnerability assessments. - Enforce strict program control processes... is completed to include auditing, configuration management, hardware inventory, software inventory, user training, POA&M updates...
Management Framework (RMF) Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions...: Cybersecurity, Information Assurance, Plan of Action and Milestones (POA&M), Risk Management Framework Certifications: None...
information and event management (SIEM) solutions, vulnerability management tools and threat intelligence platforms Familiarity... readiness for real-world incidents Perform vulnerability scans, analyze results, and assist in remediation efforts to reduce...
Bachelors Degree (e.g. Cybersecurity, Engineering, Computer Science, or related IT fields) and Active DoD 8570 Level II... of Enterprise Mission Assurance Support Service (eMASS) Knowledgeable with Supply Chain Cyber Risk Management (SCRM) Knowledge...
(NIST) security controls, Risk Management Framework (RMF), DIACAP, and other Navy / DoD security compliance processes... Secret clearance, ability to upgrade to Top Secret Eligible for CSWF IAT II (Security+ Min) Desired Skills: CISSP...
, Forensic, Signals, Exploitation etc) Vulnerability Analysts Data Analysts Penetration Testers Malware Analysts... Others… General Overview Be part of a team of diverse backgrounds performing ongoing, comprehensive vulnerability assessments...
in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate... (ATO) Utilizing vulnerability scan, port scan, compliance, and network analysis tools (e.g. ACAS, Nessus, NMAP, SCC...
in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate... (ATO) Utilizing vulnerability scan, port scan, compliance, and network analysis tools (e.g. ACAS, Nessus, NMAP, SCC...
manage a large-scale project for the implementation of a complex DLP, vulnerability management applications. 8... to as Candidate(s), who meets the general qualifications of Project Manager 3, Project Management and the specifications outlined...
and Vulnerability Management Stay up to date with the latest cybersecurity threats, vulnerabilities, and industry best practices... and response capabilities. Contribute to vulnerability management activities by assessing and prioritizing vulnerabilities...