- Battelle Memorial Institute (Columbus, OH)
- …security; compliance with policies and regulations; safeguarding of assets; and identification of any irregularities, fraud, and other acts that pose significant ... with the Internal Audit team to: + Assist with assessment and identification of application, system, and process vulnerabilities which could impact the security… more
- Bank of America (Denver, CO)
- Vulnerability Identification Quality Control Analyst Denver, Colorado **To proceed with your application, you must be at least 18 years of age.** ... GIS Vulnerability Identification Assurance (VIA) Vulnerability Identification QC ( Quality Control ) team. In this role, you will help implement,… more
- Citigroup (Irving, TX)
- …enterprise level solutions that help streamline end-to-end processes for vulnerability identification , reporting and remediation by automating repetitive ... software quality . + Identify key areas of automation within Vulnerability Assessment services and integrate them into existing automated tools ensuring… more
- Acclaim Technical Services (Annapolis Junction, MD)
- …of the following areas: Cybersecurity principles and technology, including access/ control , authorization, identification and authentication, PKI, network and ... a top workplace among DC area firms and continues to grow. The Security Control Assessor will: Conduct verification and validation for security compliance of low and… more
- MUFG (Tempe, AZ)
- …clear, well-structured documentation. Support tracking and reporting of testing progress. + ** Quality Control (QC):** Review work papers and evidence prepared by ... and control domains such as identity and access management, vulnerability management, SDLC, change /release/ incident management and technology operations within… more
- CACI International (Annapolis Junction, MD)
- …of the following areas: Cybersecurity principles and technology, including access/ control , authorization, identification and authentication, PKI, network and ... Security Control Assessor Job Category: Information Technology Time Type:...will play a critical role in identifying non-compliance, conducting vulnerability assessments, and coordinating penetration testing, while providing valuable… more
- Colorado State University (Fort Collins, CO)
- …Subject Matter Expert ( SME ) to develop extreme weather change vulnerability assessments, analyze extreme weather data, and make management recommendations for ... required to conduct literature reviews, preliminary data analysis, and vulnerability assessments. These positions require experience with weather-related risk… more
- Surgery Care Affiliates (Greensboro, NC)
- …or quarterly data collection from ongoing systematic chart review to assess quality of documentation. + Infection Control reports + Hospital ... + Root cause analysis. + Clinical practice guidelines + Sentinel Event Alerts + Identification and data collection of center specific quality indicators based on… more
- Surgery Care Affiliates (Wilsonville, OR)
- …or quarterly data collection from ongoing systematic chart review to assess quality of documentation. + Infection Control reports + Hospital ... + Root cause analysis. + Clinical practice guidelines + Sentinel Event Alerts + Identification and data collection of center specific quality indicators based on… more
- PSEG (Newark, NJ)
- …Threat Analysis and Incident Response, Cybersecurity Logging & Monitoring, Vulnerability Management, Application Security, Data Security, Insider Trust, Threat ... cybersecurity controls, policies and standards with a focus on automation and control . + Assessing the current IT architecture, business needs, and future… more
- M. C. Dean (Chantilly, VA)
- …maintains electronic security services inclusive of intrusion detection, access control , biometric authentication, video surveillance, audio visual, it systems, ... perimeter defense and command and control systems for federal, local and commercial customers across high-growth markets. Responsibilities **Information System… more
- Rigid Tactical (Norfolk, VA)
- …is actively seeking a Senior Navy Qualified Validator (NQV) / RMF, Security Control Assessor (SCA) to join our mission-focused team as Key Personnel on critical ... assessments of management, operational, and technical security controls and control enhancements within IT systems to determine overall effectiveness. +… more
- Travelers Insurance Company (St. Paul, MN)
- …Opportunity?** The Cybersecurity Operations team is responsible for the identification , protection, detection, response and disruption of cybersecurity events across ... (indications and warnings). + Perform technical and nontechnical risk and vulnerability assessments of relevant technology focus areas and complex influence risk… more
- Concurrent Technologies Corporation (HI)
- …Assist in computer network defense assessments, including threat intelligence, Risk identification , vulnerability management, and security operations. + Assess ... will work with a small team to secure and defend Facility Related Control Systems supporting the Marine Corps critical infrastructure. The Cybersecurity RMF Engineer… more
- Frontier Technology Inc. (Norfolk, VA)
- …position is designated as key personnel and an advanced level Security Control Assessor (work role: 612) under DCWF. CONTRACTOR shall conduct independent ... assessments of the management, operational, and technical security controls and control enhancements employed within or inherited by an information technology (IT)… more
- Leidos (Annapolis Junction, MD)
- …of experience with Defense in Depth Principals/technology (including access control , authorization, identification and authentication, public key infrastructure, ... solid understanding of security practices and policies as well as hands-on vulnerability testing experience. You will have numerous responsibilities from day to day… more
- Leidos (Annapolis Junction, MD)
- …of experience with Defense in Depth Principals/technology (including access control , authorization, identification and authentication, public key infrastructure, ... solid understanding of security practices and policies as well as hands-on vulnerability testing experience. You will have numerous responsibilities from day to day… more
- BAE Systems (Annapolis Junction, MD)
- …of experience with Defense in Depth Principals/technology (including access control , authorization, identification and authentication, public key infrastructure, ... understanding of security practices and policies as well as hands-on vulnerability testing experience. The selected candidate will have numerous responsibilities… more
- Banc of California (Santa Ana, CA)
- …technical status and trends. + Monitors staff in daily tasks, operations and quality control ; ensures the organization of assigned areas of the department, ... in electronic, print and other formats. + Assist in the identification , implementation and maintenance of the information privacy practices, standards and… more
- CACI International (Columbia, MD)
- …last five (5) years with cybersecurity principles and technology, including access/ control , authorization, identification and authentication, PKI, network and ... security assessments of computing environments to identify points of vulnerability , non-compliance with established Information Assurance (IA) standards and… more