ENTERPRISE VULNERABILITY ASSESSMENT PROGRAM jobs in WASHINGTON DISTRICT OF COLUMBIA, United Kingdom

, including information security program management, information assurance, security assessment and authorization support... program management and cybersecurity management. Support information assurance, security assessment and authorization...

CVP

across the organization. Administering a compliance management program dedicated to maintaining firm adherence to the Fund...'s information security policies and standards. Preserving a solid enterprise security reference architecture that acts...

International Monetary Fund

vulnerability assessments including development of risk mitigation strategies. Prepares Assessment and Authorization... and Operations infrastructure solutions and strategic adherence to all aspects of the Information Assurance (IA) program...

Peraton

vulnerability assessments including development of risk mitigation strategies. Prepares Assessment and Authorization... and Operations infrastructure solutions and strategic adherence to all aspects of the Information Assurance (IA) program...

Peraton

and Evaluation (LFT&E), and Fleet introduction of the U.S. Navy’s newest class of nuclear attack submarines. The program is a major... defense acquisition program with a total life cycle cost of approximately $336B. Additionally, successful improvement of the...

Serco

Management Framework, IT security, infrastructure, vulnerability assessment, reporting, firewalls, VPN, Data Loss Prevention, IDS...Zachary Piper Solutions is seeking a Data Engineer to develop data tools and system integrations within an enterprise...

Zachary Piper Solutions

on levels of risk and/or overall effectiveness of the enterprise's cybersecurity program. Recognize a possible security... and otherwise, involving the security of an information system' Provide expertise in and perform actions related to: Assessment...

CVP

and/or overall effectiveness of the enterprise's cybersecurity program. Participate as a member of planning teams, coordination... our clients depend on. Responsibilities Provide expertise in and perform actions related to: Assessment and Accreditation...

CVP

system, as required. Vulnerability Assessment: Analyze and assess potential security risks and vulnerabilities. Conduct...CSI is looking for a Penetration Tester to join our team on an upcoming Security and Privacy Assessment project in the...

Cyber Security Innovations

a successful Authority to Operate (ATO) assessment and authorization of system process. On our team, you will participate in information... management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities...

Booz Allen Hamilton

, designated IT security personnel in the program offices, and other staff in fulfilling Federal Information Security Management... within the job. Other duties may be assigned. Plan, develop, and conduct security testing including vulnerability and compliance...

Bering Straits Native Corporation

a successful Authority to Operate (ATO) assessment and authorization of system process. On our team, you will participate in information... management. Implement infrastructure and cybersecurity controls, including enhanced detection and vulnerability capabilities...

Booz Allen Hamilton

information security standards; conducting system security and vulnerability analyses and risk assessments; studying architecture... are functional and secure. This includes designs for program of record systems and special purpose processing nodes with platform IT...

Peraton

measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position... US CITIZENSHIP*** Program Description: The program provides support in the areas of Cybersecurity and Management to improve the...

RedTrace Technologies

assurance, and vulnerability assessment in support of DHS customers. Interpret penetration testing results to identify.... Perform and document vulnerability assessments of Government-identified DHS systems (Deliverable: Vulnerability Assessment...

eGlobalTech

dashboards using unique data sets from system logs, vulnerability assessment data, and other endpoint information sources..., vulnerability assessment data, and other endpoint information sources; product should display minimal errors in data...

Criterion Systems

) program as stipulated by various U.S. Government requirements including (but not limited to): Director of Central Intelligence... Directives (DCID), IC Directive (ICD) 503 and associated NIST publications. Preparation of Assessment and Authorization...

TekSynap