VULNERABILITY ASSESSMENT TECHNICAL jobs in WASHINGTON DC, United Kingdom

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Digital... assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity...

DHS and the Nation DHS Cybersecurity Service employees with a technical capability in Vulnerability Assessment... Vulnerability Assessment, including Vulnerability Assessment Subject Matter Expert, Supply Chain Risk Management (SCRM) Assessor...

those processes across our hybrid network environment. Generate accurate and concise vulnerability assessment reports, including...Position Title: Analyst Vulnerability Management - Network Position Summary At JetBlue, cyber security is driven...

JetBlue Airways

those processes across our hybrid network environment. Generate accurate and concise vulnerability assessment reports, including...Position Title: Analyst Vulnerability Management - Network Position Summary At JetBlue, cyber security is driven...

JetBlue Airways

but not be limited to: Serving as the Assessment Lead and responsible for overall assessment execution and guidance of technical... HVA Assessment Lead with experience conducting HVA assessments or performing Risk and Vulnerability Assessments. Knowledge...

Dovel Technologies

The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in..., Telecommunication Device Distribution Program Expert, and Vulnerability Researcher. All positions are in the DHS Cybersecurity Service...

), and National Security Agency (NSA) Vulnerability and Penetration Testing Standards Familiarity with the Cyber Security Assessment...The ideal candidate has experience performing internal penetration testing, vulnerability assessments and manual...

Hummingbirds Innovations

strategies and requirements to determine security needs. Conduct system security and vulnerability analyses and risk assessments... security measures. Create, transmit, and maintain security keys. Provide technical support and complete necessary...

Clearwaters.IT

such security control assessments, development of assessment automation solutions, and security architecture analysis. Veterans... solutions and services. In this role, you will be a part of a security control assessment team working on the tasks outlined...

Maveris

, NIST Special Publications, Risk Management Framework, IT security, infrastructure, vulnerability assessment, reporting..., and maintains key documents, compose reports, and assists in creating technical handouts. Data Compilation and Analysis...

Zachary Piper Solutions

to different Bank clients. Undertake research, dialogue, and data analytics to advance the Bank's agendas on vulnerability... with credible analysis and tools. Knowledge and Experience in Development Arena - Translates technical and cross-country knowledge...

World Bank

Plans (CP), and Plan of Action and Milestones (POA&M) reports that support the Assessment and Authorization... (A&A). Experience developing Security Control Assessment (SCA) artifacts, including the Security Assessment Plan (SAP), Security...

Peraton

regulations. Perform independent security and privacy control assessments in support of Security Assessment & Authorization (SA... the results and potential implications of identified control weaknesses. Reviews and analyze, Assessment & Authorization...

ECS

of systems. Troubleshoot software and hardware and communication components. Participate in and support vulnerability... assessment and mitigation. Provide end-user desktop environment and telephone customer support. Assist Senior System...

Federal government of the United States

security, infrastructure, vulnerability assessment, reporting, firewalls, VPN, Data Loss Prevention, IDS/IPS, Web-Proxy... and verification technical requirements for completeness, consistency, feasibility, and testability. Identification and Resolution...

Zachary Piper Solutions

, and vulnerability assessment tools to mitigate application-layer risks. 6. Identity and Access Management (IAM): Expertise in IAM... and recommendations to technical and non-technical stakeholders, as well as to document security architecture designs and requirements...

Tria Federal (Tria)

, vulnerability assessment, reporting, firewalls, VPN, Data Loss Prevention, IDS/IPS, Web-Proxy, security audits, .Net, .net, SQL... and Execution, Product Support Package, Technical Manual Development and Finalization, Equipment Standardization, Memorandum...

Zachary Piper Solutions