• Capgemini Government Solutions (Mclean, VA)
    …by performing configuration analysis against the target device Conduct vulnerability analysis , and research, collaborate with System Administrators to ... ACAS: Installation, monitoring, testing, troubleshooting, and administration of the ACAS/Nessus Vulnerability Scanner Automation of weekly security scans and… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • The George Washington University (Ashburn, VA)
    …a secure development lifecycle, assessing information systems, recommending security best practices, providing vulnerability management and generally ... (GCSA), GIAC Enterprise Vulnerability Assessor (GEVA), Offensive Security Certified Professional (OSCP), Global Information Assurance Certification… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Fidelity Bank (Wichita, KS)
    …and investigating alerts related to endpoint security , incident response, vulnerability management, email analysis , web filter management, and cloud ... to endpoint security , including triage, potential malware analysis , false positive detections, and vulnerability remediation...for this position include: 2-4 years of experience in information security , with experience in the banking… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • KaiHonua (Killeen, TX)
    …and resulting security risk analysis of systemsReview and assess information security events and logs via sophisticated security information ... as well as provide Automated Information System Accreditation supportProvide Security Risk Assessment. Perform risk analysis of resources, controls,… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Blanchard Valley Hospital (Findlay, OH)
    …plans to ensure the physical safety at BVHS locations. Duty 5: Completes and compiles vulnerability analysis and security risk assessments for review by Risk ... are knowledgeable of operation. This position is responsible for conducting hazard vulnerability analyses, risk assessments and security investigations. The … more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Capgemini Government Solutions (Indianapolis, IN)
    …will work closely with our clients to provide technical support in information security response, security monitoring, and supports audit/compliance ... supporting a large global enterprise environment Shown and tried comprehension of Information Security tool, maintaining including applying patches and updates… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Capgemini Government Solutions (Austin, TX)
    …enhance security capabilities and performance Perform security monitoring, vulnerability assessments, and forensic log analysis to proactively detect ... security control frameworks/guidelines to ensure consistent application of information security controls Recognize and identify potential threats and… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • GXO (Chicago, IL)
    …and security throughout the workplaceInitiate investigations based on the analysis of loss trends, internal reports and input from other informational ... sourcesConduct security audits and surveys to detect areas of vulnerability or violations of company policies and proceduresAssist field operations in developing… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Computer World Services (CWS)Corporation (San Antonio, TX)
    Security Event Tracking and Resolution. Complete tasks designed to ensure security of the organization's systems and information assets. Protect against ... report AFIN NDCI events; electronic storage incidents (ESIs); personally identifiable information (PII) incidents; cyber security events (CSEs); Active Indicator… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • KaiHonua (Austin, TX)
    …Systems, Intrusion Prevention Systems, Security Information Management/ Security Event Management, network mapping, vulnerability scanners, firewalls, ... to the information systems to maintain protection, accomplish risk analysis , security testing, and certification due to modifications or changes,… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Imagine One Technology (Jacksonville, FL)
    …Comp Forensics Invest and Response Intermediate Cyber Core (ICC) NEC 742A Network Security Vulnerability Technician NEC H08A Advanced Network Analyst NEC H10A ... an IT level-1 designation in Joint Personnel Adjudication System (JPAS) and/or Defense Information System for Security (DISS)Imagine One offers a full package of… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Computer World Services (CWS)Corporation (Colorado Springs, CO)
    …detection, identification, and internal/external IT threat analysis . *Implementing vulnerability management to ensure security of systems IAW Government ... for troubleshooting large enterprise networks. *Knowledge to apply DISA Security Technical Implementation Guides' (STIG) requirements associated with network routers… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Computer World Services (CWS)Corporation (Hampton, VA)
    …detection, identification, and internal/external IT threat analysis . * Implementing vulnerability management to ensure security of systems IAW Government ... troubleshooting large enterprise networks. o Knowledge to apply DISA Security Technical Implementation Guides' (STIG) requirements associated with network routers… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Capgemini Government Solutions (Washington, DC)
    …SSL/TLS and PKI) protocols, experience configuring and implementing various technical security solutions, extensive experience providing analysis and trending of ... Capgemini Government Solutions (CGS) is seeking a highly motivated Cyber Security Content Developer/ Cyber Threat Detection Developer (Threat Detection Developer)… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Dexian - Signature Consultants (Austin, TX)
    …support compliance with local, state, and federal reliability and cyber security standardsInteract with ERCOT, power plants, market participants, and vendor ... level architecture, system configuration, and system operationsUpdate system with security , operating system, and application patches. Analyze anti-virus configurations… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Computer World Services (CWS)Corporation (Sierra Vista, AZ)
    …Army Global Cyber Center (GCC) program responsible for performing non-personal Information Technology (IT) Services and support requirements. GCC is responsible to ... of systems operations and administration are included in the overall information systems planning of the organization.Responsible for the installation, maintenance,… more
    JobGet (09/22/24)
    - Save Job - Related Jobs - Block Source
  • Systems Vulnerability Analyst

    Parsons Corporation (Annapolis Junction, MD)
    …and software, computer or information systems design/development, programming, information /cyber/network security , vulnerability analysis , ... project that will make a huge impact on the security of DOD/Intel community? If you're interested in leveraging...If you're interested in leveraging and honing your systems vulnerability analysis and reporting skills to gather,… more
    Parsons Corporation (09/21/24)
    - Save Job - Related Jobs - Block Source
  • Sr. System Vulnerability Analyst

    Themis Insight (Fort Meade, MD)
    …, Information Technology, Information Assurance, and Information Security ). + Relevant experience must be in vulnerability analysis , penetration ... and/or computer forensics. In addition, may include computer or information systems design/development, programming, information /cyber/network security ,… more
    Themis Insight (08/08/24)
    - Save Job - Related Jobs - Block Source
  • Exploitation Analysts 1-4 (EA)

    Amentum (Fort Meade, MD)
    …experience in computer or information systems design/development, programming, information /cyber/network security , vulnerability analysis , ... experience in computer or information systems design/development, programming, information /cyber/network security , vulnerability analysis ,… more
    Amentum (09/20/24)
    - Save Job - Related Jobs - Block Source
  • Information Security

    Bank of America (Denver, CO)
    Information Security Vulnerability Management Innovation SME Denver, Colorado;Chicago, Illinois **Job Description:** At Bank of America, we are guided by a ... information security risk by providing data-driven, reliable, and timely analysis of the bank's susceptibility to vulnerability exploitation based on a… more
    Bank of America (09/12/24)
    - Save Job - Related Jobs - Block Source