The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Digital... assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity...
. ยท Strong technical skills and proficiency in using vulnerability assessment tools and techniques (e.g., Nessus, Qualys, Metasploit..., weaknesses, and potential threats to critical infrastructure assets. 2. Utilize advanced vulnerability assessment tools...
TRIAEMand responsible for the management and technical administration of the Information System (IS) in accordance with internal... Subject Matter Expert (SME) within the Information Assurance technical domain. Ability to work independently...
Leidosthe asset identification and assessment portions of the Mission Assurance construct. This includes recommending nomination... for MA Assessments. This person will prepare briefings, write or contribute to technical analysis white papers, and conduct routine...
BarbaricumArlington, VA. The Security Control Assessor is responsible for conducting a comprehensive assessment of the management..., operational, and technical security controls employed within or inherited by an SAP information system to determine the overall...
MaximusArlington, VA. The Security Control Assessor is responsible for conducting a comprehensive assessment of the management..., operational, and technical security controls employed within or inherited by an SAP information system to determine the overall...
Maximus(IS) will be functional and secure. They define IA requirements that provide for the Government's assessment and authorization process... of an IT system. They provide systems security engineering, integration services, technical assessments, and solutions...
NTT Datafor the management and technical administration of the Information System (IS) in accordance with internal and external... Subject Matter Expert (SME) within the Information Assurance technical domain. Ability to work independently...
Leidos(IS) will be functional and secure. They define IA requirements that provide for the Government's assessment and authorization process... of an IT system. They provide systems security engineering, integration services, technical assessments, and solutions...
NTT Datathe technical and functional teams during the migration to a multi-factor authentication solution. Responsibilities... with the technical team (developers, system administrator), support the creation and maintenance of technical documentation...
Dovel TechnologiesPlans, etc.) Information Security Vulnerability Management (ISVM) compliance, DHS Performance Plan requirements, audit... and simplify the process. Conduct system compliance assessment to identify progress on ATO conditions, develop extension packages...
Zermount, Incof Standard Technical Implementation Guides (STIGS) at time of assessment. Conduct Audit of Privileged Accounts (APA) as part... Security Assessments will include Security Control Assessments (SCAs), Risk Assessment (RA) and analysis, evaluations...
Zermount, Incyears of concurrent experience in Vulnerability Assessment and/or Risk Analysis. Required Certifications: DoD Manual... and implementation of weapons system security mechanisms. 5+ years of experience in Vulnerability Assessment and/or Risk Analysis...
General Dynamicsyears of concurrent experience in Vulnerability Assessment and/or Risk Analysis. Required Certifications: DoD Manual... and implementation of weapons system security mechanisms. 5+ years of experience in Vulnerability Assessment and/or Risk Analysis...
General Dynamicsfollowing areas: Network security vulnerability assessment and testing Physical security vulnerability assessment and testing... a technically oriented Cyber or related role Over 4 years of experience in a direct technical role Extensive knowledge...
Motion Recruitmentassessment/management. Familiar with the management, operational, and technical aspects of IT Security in a complex environment... Experience configuring and implementing various technical security solutions, Substantial experience managing vulnerability...
Leidosassessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity... have successfully completed the multi-phase assessment process for their capability and career track/level) for consideration for these...