project for the implementation of a complex DLP, vulnerability management applications. 8 years Managing up to three staff... and Security Web Information Systems using SaaS vulnerability management and DLP applications. 5 years Familiar managing when...
(IAT) Level II certification: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE...Overview: The AFINC II contract supporting the 26th Network Operations Squadron (26NOS) is seeking qualified Router...
environments. This role involves conducting comprehensive risk assessments, leading vulnerability management efforts, and ensuring... platforms, IoT devices, data centers, and software applications. Expertise in vulnerability management processes, penetration...
Required Ability to effectively manage a large-scale project for the implementation of a complex DLP, vulnerability management... Information Systems using SaaS vulnerability management and DLP applications. 5 Preferred Familiar managing when resources...
requirement allocations, traceability, and testability. Defines implementation plan and communicates with release management team... and accomplishments Attending required technical meetings Required Qualifications: Minimum of 8 years' systems analyst/engineer...
Required Ability to effectively manage a large-scale project for the implementation of a complex DLP, vulnerability management... Information Systems using SaaS vulnerability management and DLP applications. 5 Preferred Familiar managing when resources...
manage a large-scale project for the implementation of a complex DLP, vulnerability management applications. 8... Cybersecurity project. This project requires 8 or more years of advanced security project management experience, relies on extensive...
implementation of a complex DLP, vulnerability management applications. 8 Required Managing up to three staff augmentation..., Building and Security Web Information Systems using SaaS vulnerability management and DLP applications. 5 Preferred Familiar...
a motivated Router Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations... for the 26th NOS. Oversee intrusion detection, intrusion prevention, boundary protection and vulnerability assessment...
a motivated Router Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations... for the 26th NOS. Oversee intrusion detection, intrusion prevention, boundary protection and vulnerability assessment...
a motivated Router Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations... for the 26th NOS. Oversee intrusion detection, intrusion prevention, boundary protection and vulnerability assessment...
a motivated Router Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations... for the 26th NOS. Oversee intrusion detection, intrusion prevention, boundary protection and vulnerability assessment...
Router Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations Squadron... NOS. Oversee intrusion detection, intrusion prevention, boundary protection and vulnerability assessment operations to defend the...
Network Engineer with proven experience to join the AFINC II contract supporting the 26th Network Operations Squadron (26NOS... intrusion detection, intrusion prevention, boundary protection and vulnerability assessment operations to defend the Air Force...
security posture of our IT infrastructure. Responsibilities include implementing security measures, conducting vulnerability... information systems IAW DAFMAN 17-1203 Provide comprehensive program oversight and management of eTools and eTOs hardware...
System (ESS). Provide daily operational support to the Information Assurance Vulnerability Management (IAVM) to ensure.... Strong knowledge of vulnerability management, endpoint security, and data loss prevention practices. Familiarity with account...
incident triage; to include determining scope, urgency, and potential impact; identifying the specific vulnerability... identified, number of true positives identified, and average time to execute (based on incident detection monitoring analyst...
System (ESS). Provide daily operational support to the Information Assurance Vulnerability Management (IAVM) to ensure.... Strong knowledge of vulnerability management, endpoint security, and data loss prevention practices. Familiarity with account...
of documentation including Test Plan, Data Management and Analysis Plan, Test Execution Procedures, Test Report and Detailed Analysis... system documentation and lead/coordinate vulnerability assessments to determine any system cyber deficiencies. Identify...
actionable cyber intelligence to support incident response, vulnerability management, and other cybersecurity initiatives... US * * The Opportunity: As a Cyber Threat Intelligence Analyst, you will play a crucial role in identifying and mitigating cyber...