- GovCIO (Annapolis, MD)
- **Overview** GovCIO is currently hiring for Endpoint Vulnerability Management Subject -Matter Expert/Technical Lead for our NIH Proposal. The Technical ... $180,000.00 /Yr. Submit a referral to this job (https://careers-govcio.icims.com/jobs/6978/ endpoint - vulnerability - management - subject -matter-expert-technical-lead/job?mode=apply&apply=yes&in\_iframe=1&hashed=-1834385473) **Location**… more
- UIC Government Services and the Bowhead Family of Companies (Arlington, VA)
- …non-repudiation) * Utilize Tenable Assured Compliance Assessment Solution (ACAS) for vulnerability management * Manage Trellix Endpoint Security ... standards for cloud-based systems * Conduct comprehensive security assessments and vulnerability analyses on cloud infrastructure * Manage security documentation and… more
- TekSynap (Rockville, MD)
- …design, implementation, support, maintenance, and expansion of the following security management tools: + Palo Alto Networks Firewalls: managing firewalls using ... and operational work with the following technologies/skill areas: + Vulnerability and Configuration Compliance Scanning + Creating Standard Operating Procedures… more
- Amentum (Fort Meade, MD)
- …information to guide tasking, identify problems, and assist with collection management ; and recognizes essential elements of information to enable endpoint ... systems design/development/analysis, engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems… more
- CareFirst (Washington, DC)
- …policies, indicators, and protocols. + Designs technical solutions for network protection, endpoint security, access control, auditing, and log management . Uses ... in change management practices. + Cyber security business and systems subject matter management expertise in Application Security, Data Security, Data… more
- Johns Hopkins University (Baltimore, MD)
- …for log management , host security, cloud security, asset discovery, vulnerability management , incident response, threat intelligence, Security Incident and ... Event Management (SIEM), Security Orchestration and Automated Response (SOAR), Network...The Engineer will be responsible for running penetration and vulnerability scans externally, internally, and producing reports and providing… more
- Noblis (Washington, DC)
- …environments that underpin FAA mission operations. **Cybersecurity Operations & Risk Management ** + Monitor and analyze cyber threats targeting **air traffic control ... both enterprise and operational technology (OT) systems. + Perform vulnerability assessments and coordinate **mitigation of risks impacting FAA mission-critical… more
- M. C. Dean (Annapolis Junction, MD)
- …developing system architectures, and performing technical/non-technical assessment and management as well as end-to-end flow analysis. Specific responsibilities ... system development and implementation planning through preparation of system engineering management plans and system integration and test plans. + Interact with… more
- Capital One (Mclean, VA)
- …Security + Experience with Threat Modeling + Experience with Penetration Testing or Vulnerability Management + Experience with integrating SaaS products into an ... with Cloud Service technologies like Storage Services, Security & Access Control Management , Container Services, and API Implementation and Management . You are… more
- M. C. Dean (District Of Columbia, DC)
- …system development and implementation planning through the preparation of system engineering management plans and system integration and test plans. + Interact with ... analysis in non-functional system performance areas like Reliability, Maintainability, Vulnerability , Survivability, etc. + Capture all interface designs in a… more
- M. C. Dean (Annapolis Junction, MD)
- …secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the ... and maintenance of Information Technology (IT) systems in support of the endpoint devices. The position provides Tier 1 helpdesk support and support to… more
- Leidos (Washington, DC)
- …systems + Familiarity with endpoint protection, SIEM integration, and vulnerability management + Understanding of zero-trust architecture and secure system ... all documentation to effectively capture the configuration baseline. Support performance management to ensure key metrics are tracked and captured reflecting the… more
- Capital One (Mclean, VA)
- …controls of a cybersecurity program including qualitative risk analysis steps, vulnerability and patch management , threat modeling, Identity and Access ... & network security fundamentals, malware defense, data loss prevention and endpoint security. + Compile professional security assessment reports, slides, and lead… more
- M. C. Dean (Annapolis Junction, MD)
- …secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the ... and maintenance of Information Technology (IT) systems in support of the endpoint devices. The position provides Tier 1 helpdesk support. This position requires… more
- Proofpoint (Maryland City, MD)
- …as well as our current and future customers. As a technical liaison and subject matter expert on all things Proofpoint, you will help to deliver People-Centric ... able to provide valuable customer insight and real-world experiences to Product Management , Marketing and Product Development (Engineering) teams to help keep our… more
- Deloitte (Baltimore, MD)
- …documentation for controls, procedures, and incident handling. + Support vulnerability management activities, including scanning, assessment, and remediation. ... in configuring and deploying cybersecurity tools (eg, SIEM, IDS/IPS, firewalls, endpoint security). + Maintain and optimize security architectures for on-premises… more
- Insight Global (Arlington, VA)
- …full analysis on the enterprise security posture to include: o Enterprise Vulnerability Remediation o Building ATO Packages o Analysis of RMF Security Controls ... Tools for Analysis on Endpoints o Intrusion Detection Systems (IDS) and Event Management o Implementing and Leveraging a Zero Trust Framework * Conduct regular… more