VULNERABILITY ASSESSMENT TECHNICAL jobs in ROSSLYN VA, United Kingdom

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Digital... assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity...

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Digital... assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity...

those processes across our hybrid network environment. Generate accurate and concise vulnerability assessment reports, including...Position Title: Analyst Vulnerability Management - Network Position Summary At JetBlue, cyber security is driven...

JetBlue Airways

. ยท Strong technical skills and proficiency in using vulnerability assessment tools and techniques (e.g., Nessus, Qualys, Metasploit..., weaknesses, and potential threats to critical infrastructure assets. 2. Utilize advanced vulnerability assessment tools...

TRIAEM

but not be limited to: Serving as the Assessment Lead and responsible for overall assessment execution and guidance of technical... HVA Assessment Lead with experience conducting HVA assessments or performing Risk and Vulnerability Assessments. Knowledge...

Dovel Technologies

), and National Security Agency (NSA) Vulnerability and Penetration Testing Standards Familiarity with the Cyber Security Assessment...The ideal candidate has experience performing internal penetration testing, vulnerability assessments and manual...

Hummingbirds Innovations

the technical and functional teams during the migration to a multi-factor authentication solution. Responsibilities... with the technical team (developers, system administrator), support the creation and maintenance of technical documentation...

Dovel Technologies

Plans, etc.) Information Security Vulnerability Management (ISVM) compliance, DHS Performance Plan requirements, audit... and simplify the process. Conduct system compliance assessment to identify progress on ATO conditions, develop extension packages...

Zermount, Inc

of Standard Technical Implementation Guides (STIGS) at time of assessment. Conduct Audit of Privileged Accounts (APA) as part... Security Assessments will include Security Control Assessments (SCAs), Risk Assessment (RA) and analysis, evaluations...

Zermount, Inc

assessment scans using various web, application, operating systems, and database vulnerability scanners. Assist senior team... layers of the systems (application database layers) by performing manual testing and automated system vulnerability...

Strategic Operational Solutions

sufficient artifacts to verify technical control implementation against agency security policies Conduct Vulnerability... Vulnerability and Compliance Assessment Conduct verbal discussions and meeting to address the Vulnerability and Compliance...

OCT Consulting, LLC

mapping, vulnerability scanning tools (e.g., ACAS, Nessus), and Security Technical Implementation Guides (STIGs) and Security.... Responsibilities: The Navy Qualified Validator (NQV) will be responsible for assisting in the technical implementation of the Risk...

years of concurrent experience in Vulnerability Assessment and/or Risk Analysis. Required Certifications: DoD Manual... and implementation of weapons system security mechanisms. 5+ years of experience in Vulnerability Assessment and/or Risk Analysis...

General Dynamics

following areas: Network security vulnerability assessment and testing Physical security vulnerability assessment and testing... a technically oriented Cyber or related role Over 4 years of experience in a direct technical role Extensive knowledge...

Motion Recruitment

years of concurrent experience in Vulnerability Assessment and/or Risk Analysis. Required Certifications: DoD Manual... and implementation of weapons system security mechanisms. 5+ years of experience in Vulnerability Assessment and/or Risk Analysis...

General Dynamics

strategies and requirements to determine security needs. Conduct system security and vulnerability analyses and risk assessments... security measures. Create, transmit, and maintain security keys. Provide technical support and complete necessary...

Clearwaters.IT

, NIST Special Publications, Risk Management Framework, IT security, infrastructure, vulnerability assessment, reporting..., and maintains key documents, compose reports, and assists in creating technical handouts. Data Compilation and Analysis...

Zachary Piper Solutions