Vulnerability Assessment Jobs

1 to 25 of 519 Vulnerability Assessment Jobs

CND Specialist with Security Clearance

Springfield, Virginia, United States
NewGen Technologies, Inc
NewGen is seeking a Computer Network Defense Vulnerability Assessment Specialist with the following background. Responsibilities - Developing and executing the organization's continuous vulnerability assessment strategy. - Measuring the effectiveness of defense-in-depth mechanisms against vulnerabilities and developing recommendations to remediate systemic security issues. - Configuring, operating, maintaining, and evaluating the effectiveness of vulnerability scanning and assessment … Assessing the level of risk introduced by vulnerabilities and developing remediation strategies. - Investigating and analyzing cybersecurity incidents to ensure the appropriate response activities and mitigations are applied. - Distributing periodic vulnerability assessment reports, summaries, notifications, and an annual vulnerability assessment scorecard to CIO leadership and IT stakeholders. - Developing and maintaining documentation as it pertains to the use … and operation of vulnerability assessment tools and methodologies (SOPs, assessment plants, test plants, etc.). Qualifications - 7+ years' experience as a cybersecurity analyst, administrator, or engineer responsible for Enterprise vulnerability management toolsets (e.g., ACAS, Tenable, Nessus, Rapid7, AppSpider, SCAP, STIG Viewer, etc.). - Demonstrated proficiency and expertise in the following areas: - Applying computer networking concepts, protocols More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Vulnerability Assessment & Analysis Officer with Security Clearance

Chantilly, Virginia, United States
Cornerstone Defense
Cyber Vulnerability Assessment & Analysis Officer Clearance: TS/SCI with Polygraph Chantilly, VA Supporting the Most Exciting and Meaningful Missions in the World We are looking for a team-members with creative talent who are ready to take on the challenge of, Cyber Security Vulnerability A&A Officer to support at a sponsor facility. The Cyber Vulnerability … with Sponsor's offices, departments, or programs. The officer shall perform the following functions and deliver outcomes as follows: please keep reading Core responsibilities of the position include: • Perform vulnerability assessment against system baselines to evaluate effectiveness of system configurations to include validation of system software, software patching and hardware configurations. • Conduct compliance checks for patches on deployed … program systems. • Conduct vulnerability assessment to support sponsor with Assessment & Accreditation Security Policies & procedures, and compliance with ISSO/ISSM requirements and sponsor's security regulations. • Assure compliance with accreditation documentation in coordination with program ISSO/ISSM staff. • Conduct Nmap port scanning as needed. • Operate open source security tools, such as Nmap, or other applicable products More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Assessment Analyst - Intermediate with Security Clearance

Springfield, Virginia, United States
Rividium, Inc
Title Vulnerability Assessment Analyst - Intermediate Full-Time/Part-Time Full-Time Description RiVidium Inc (dba, TripleCyber) is seeking a Vulnerability Assessment Analyst who will perform assessments of systems and networks within the NE or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. Measures effectiveness of defense … reviews as appropriate within environment (e.g., Technical Surveillance, Countermeasure Reviews TSCM , TEMPEST countermeasure reviews). Perform technical (evaluation of technology) and nontechnical (evaluation of people and operations) risk and vulnerability assessments of relevant technology focus areas (e.g., local computing environment, network and infrastructure, enclave boundary, supporting infrastructure, and applications). Make recommendations regarding the selection of cost-effective security … controls to mitigate risk (e.g., protection of information, systems and processes).ABILITIES: Skill in conducting vulnerability scans and recognizing vulnerabilities in security systems. Skill in assessing the robustness of security systems and designs. Skill in detecting host and network based intrusions via intrusion detection technologies (e.g., Snort). Skill in mimicking threat behaviors. Skill in the use of penetration More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Engineer with Security Clearance

Chantilly, Virginia, United States
Peraton
/or computer exploitation; 1+ years of experience across three or more of the following: mobile device security, telecommunications protocols, Operating Systems (Linux, Android, Windows, iOS), software reverse engineering, vulnerability assessment, or malware forensics; Familiarity with cyber security tools such as Splunk, Zeek, Snort, etc. Experience working with and analyzing both raw and processed data; Scripting experience; Ability … and the willingness and ability to adapt to dynamic and unexpected customer requirements Desired Qualifications 6+ years of experience across technical competencies, such as: analysis, network engineering, network security, vulnerability assessment, technical collection, penetration testing, red teaming, hardware engineering, software reverse engineering, cyber operations, and/or computer exploitation; 3+ years of experience across three or more of … the following: mobile device security, telecommunications protocols, Operating Systems (Linux, Android, Windows, iOS), software reverse engineering, vulnerability assessment, or malware forensics; System administration experience including support to Linux and/or Windows applications; Relevant certifications such as CISSP, CCFP, CCSP, CEH, GCFA, GCIA, etc. Peraton offers enhanced benefits to employees working on this critical National Security program, which More ❯
Employment Type: Permanent
Salary: USD 216,000 Annual
Posted:

Junior Information System Security Officer with Security Clearance

Washington, Washington DC, United States
Hybrid / WFH Options
Tyto Athene, LLC
security authorization packages in accordance with the client's requirement and compliant with FISMA. Core documents that the candidate will be responsible for are the System Security Plan, Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan, Standard Operating Procedure, Plan of Actions and Milestones, Remediation Plans, Configuration Management Plan, etc. Develop and maintain … test, and train on Contingency Plans and Incident Response Plans Perform risk analyses to determine cost-effective and essential safeguards Support Incident Response and Contingency activities Perform security control assessment in using NIST 800-53A Conduct independent scans of the application, network, and database (where required) Provide continuous monitoring to enforce client security policy and procedures and create … Volumes 1 and 2, 800-64 Revision 2, 137, 144, 147; CNSS 1253 and risk management methodologies Network, network protocols, routers, and switches and how they interact with automated vulnerability assessment tools, open-source vulnerability assessment tools, and techniques used for evaluating security controls on Windows, Linux, and Unix operating systems, networking devices, databases, and web More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Vulnerability Management Engineer with Security Clearance

Washington, Washington DC, United States
ShorePoint, Inc
days of PTO, 11 holidays, 85% of insurance premium covered, 401k, continued education, certifications maintenance and reimbursement and more. Who we're looking for: We are seeking a Vulnerability Management Engineer to support vulnerability management and remediation efforts in a complex cybersecurity environment. The ideal candidate will have strong technical skills, experience with vulnerability disclosure platforms and … expertise in vulnerability scanning and remediation. The Vulnerability Management Engineer will provide technical support, generate reports and recommend improvements to the vulnerability management (VM) program. This is a unique opportunity to contribute to the growth and culture of a fast-growing company in the cybersecurity market. What you'll be doing: Develop and maintain Standard Operating Procedures … SOPs), playbooks and process documents related to vulnerability management. Use the Microsoft Office Suite to generate reports and presentations for internal and external stakeholders. Perform scheduled vulnerability scans across production, disaster recovery and test/development environments, as well as ad-hoc scans to support troubleshooting. Support the verification, remediation and closure of vulnerabilities, ensuring timely resolution. Manage More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Assurance Policy and Compliance - Ops Lead with Security Clearance

Albuquerque, New Mexico, United States
Akima
regulations, including RMF, NIST 800-53, and FISMA. Develop, implement, and enforce IA policies, security guidelines, and best practices to safeguard IT systems. Oversee patch management, system hardening, and vulnerability scanning to maintain compliance. Conduct regular audits, risk assessments, and security control evaluations to identify gaps and recommend improvements. Generate compliance reports, incident summaries, and vulnerability assessment findings for Federal stakeholders. Vulnerability Management & Network Security Oversee the configuration, maintenance, and administration of network security appliances. Perform penetration testing, vulnerability scanning, and remediation efforts to identify and address security weaknesses. Maintain up-to-date knowledge of cyber threats, attack vectors, and security technologies to enhance defensive strategies. Implement intrusion prevention measures, malware detection strategies, and … years of experience as a Tier-2+ Cybersecurity Operations Lead in a DoD, DOE, or Law Enforcement environment. Minimum 3 years of experience in information security operations, incident analysis, vulnerability management, intrusion detection, and system patching. 8+ years' experience leading information technology and cybersecurity teams BA/BS in Information Technology, Cybersecurity, Computer Science or 4 years of equivalent More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Assurance Engineer with Security Clearance

Arlington, Virginia, United States
Peraton
RMF) as required for assigned systems (National Institute for Standards and Technology, Department of Defense, Special Access Programs, Defense Security Service, National Industrial Security Program) Lead and support security assessment activities needed to obtain and/or maintain the Approval to Operate (ATO) security authorization for assigned systems Identify security risks, threats and vulnerabilities of networks, systems, applications and … Level 3 compliant professional certification (i.e. CISSP, CISM, GSLC, GCIH, CISA, GCED, or SCNA). Background in Systems Engineering with emphasis on cyber security. Experience with configuring, hardening and vulnerability assessment of Windows servers and workstations. Experience with configuring, hardening and vulnerability assessment of Network products such as Routers, Switches and Firewalls (CISCO, Juniper). Experience … with security assessment and authorization activities required for Federal information systems. Experience using security tools such as Nessus/ACAS, STIGs, McAfee, HP WebInspect, Solarwinds Event Manager, and Solarwinds patching tool. Experience with the design, implementation, and operation of Intrusion Detection Monitoring systems, sensors, and security taps. Experience with the design, implementation, and operation of Host Based Security Systems.Desired More ❯
Employment Type: Permanent
Salary: USD 138,000 Annual
Posted:

Principal Cyber Systems Engineer with Security Clearance

Colorado Springs, Colorado, United States
Northrop Grumman
Base. We're looking for a highly motivated, team-oriented individual that understands security and the importance of our mission. The candidate will be responsible for performing standard security assessment of the systems and servers on the network, conducting vulnerability scanning, end point monitoring, working to develop and implement the ability to conduct Pentesting into the environment and … more. The candidate will act as a Cyber Subject Matter Expert (SME) and ensure compliance with the Risk Management Framework. Responsibilities: Conduct routine vulnerability assessment of the respective systems and servers on the network. Monitor, maintain and review requirements set aside by local policy for endpoint system management. Periodically conduct a complete review of each systems' audits and … are closed. Assures the implementation of Cyber Security disciplines, including COMSEC, COMPUSEC, EMSEC, OPSEC, digital communications systems, network protocols and architectures, and penetration tools and techniques. Support the continuous assessment of IA Control compliance for systems within their responsibility. Document the results of Certification and Accreditation activities, technical or coordination activity, prepare the system Security Plans, and update the More ❯
Employment Type: Permanent
Salary: USD 165,500 Annual
Posted:

Network/System Administrator III with Security Clearance

Washington, Washington DC, United States
gTANGIBLE
Server, Red Hat Enterprise Linux servers, MS Hyper- V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft … Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Network/System Administrator III with Security Clearance

Colorado Springs, Colorado, United States
gTANGIBLE
Server, Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS, Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft … Directory Red Hat Enterprise Linux servers, MS Hyper-V/VMWare/ESx/Xen Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis/vulnerability assessment, Group Policy management and configuration, Scripting, BMC Footprints, WSUS Lumension, Bitlocker, SQL Server 2012, TomCat, IIS, Windows Server 2012r2/2016, Win 10, Red Hat 6.5, Microsoft More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Subject Matter Expert - Lead with Security Clearance

Fort Belvoir, Virginia, United States
IPTA
Hunger to continually learn and grow Responsibilities: Provides expert support, research and analysis of exceptionally complex problems, and processes relating to them Serves as technical expert to the Cybersecurity Assessment Program providing technical direction, interpretation, and alternatives to complex problems Thinks independently and demonstrates exceptional written and oral communications skills Applies advanced technical principles, theories, and concepts Contributes to … Five (5) years Cybersecurity experience Strong analytical and problem-solving skills for resolving security issues Strong skills implementing and configuring networks and networks components Proven proficiency performing CCRI/vulnerability assessment/penetration testing on networks, databases, computer applications and IT frameworks Knowledge and understanding of DOD security regulations, DISA STIGs Expert experience in cybersecurity and evaluations Excellent … knowledge of and proficiency with: VULNERATOR, USCYBERCOM CTO Compliance Program, Wireless vulnerability assessment, Web Services (IIS, Apache, Proxy), Database (SQL Server, Oracle), Email Services (Exchange), Vulnerability Scans (NESSUS, SCCM), Knowledge of Phishing exercises, USB Detect, Physical Security IPTA is an Equal Opportunity/Affirmative Action employer. We are committed to providing equal employment opportunity to all qualified More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Associate, Information Security Systems Engineer Secret - with Security Clearance

Colorado Springs, Colorado, United States
L3Harris Technologies
with systems developers or commercial product vendors in the design and evaluation of state-of-the-art secure systems, networks, and database products. Uses methods such as encryption technology, vulnerability analysis and security management. Responsible for integration of multiple methods into a cohesive system security perimeter and environment and the policies and procedures necessary to monitor and maintain such … attention to detail. Ability to work across multiple teams and create standardized products. Familiarity with Linux. Familiarity in the development of policies and procedures for emerging security technologies. Support vulnerability assessment activities as required. Support the evaluation, qualification, testing and delivery of security architecture improvement, obsolescence replacement and vulnerability response projects. Assist program security in the development … of prior related experience. Secret security clearance required. DOD 8570.01M IAT-1 or IASAE-1 certification required. Preferred Additional Skills: Familiarity with configuration and use of cyber defense and vulnerability assessment tools such as ACAS and SCC. Basic understanding of engineering processes, concepts and information security systems engineering principles (NIST SP 800-160 Vol1). Familiarity with DoD More ❯
Employment Type: Permanent
Salary: USD 128,000 Annual
Posted:

Security Control Assessor Level 3 (FORECASTED) with Security Clearance

Annapolis Junction, Maryland, United States
Columbia Technology Partners
requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … and possible mitigations for requirements that are not in compliance Validate the security requirements of the information system Verify and validate that the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and deliver a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification … and validation report (certification report) for the information system Qualifications: Twelve (12) years experience in security, systems engineering or system assessment to include recent experience within the last three (3) years in five (5) or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Engineer (Associate - Mid Level) with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
G2 Ops, Inc
and risk management automation supporting the U.S. Navy's AEGIS Weapon System. What does this mean to you? We are seeking expertise in Model-Based Systems Engineering (MBSE), cyber vulnerability assessment, and software development such as: Experience developing and refining large-scale database and application software systems Proven ability to mature MBSE-enabled cyber vulnerability assessment … obtain authorization for secure model-based engineering environments Familiarity with developing interface management automation techniques for rapid interoperability evaluation Knowledge of analytical report and dashboard development for baseline and vulnerability data visualization Strong understanding of software testing, debugging, and documentation best practices Bachelor's degree in Engineering, Computer Science, Information Systems, or related technical field What makes someone choose More ❯
Employment Type: Permanent
Salary: USD 120,000 Annual
Posted:

Vulnerability Management Specialist with Security Clearance

Washington, Washington DC, United States
Agile Defense, Inc
advanced technologies, elite minds, and unparalleled agility-leveraging a foundation of speed, flexibility, and ingenuity to strengthen and protect our nation's vital interests. Requisition #: 1212 Job Title: Vulnerability Assessment Analyst III Exempt Job Title for Careers Page: Vulnerability Management Specialist Location: 2070 Chain Bridge Road in Vienna, VA, OR 1750 Pennsylvania Avenue, NW, Washington, DC. … Clearance Level: Active DoD - Secret SUMMARY We are seeking a Vulnerability Management Specialist for a potential opportunity to identify, analyze and manage vulnerabilities across enterprise networks and systems. This role is responsible for ensuring continuous improvement of detection signatures and communicating vulnerability risks to stakeholders. The Vulnerability Management Specialist position requires strong technical expertise, proficiency in vulnerability … fast-growing company in the cybersecurity market. JOB DUTIES AND RESPONSIBILITIES • Identify, analyze and manage vulnerabilities across enterprise systems and networks. • Continuously update and tune detection signatures to improve vulnerability identification. • Collaborate with internal experts to develop solutions to complex vulnerability management challenges. • Communicate vulnerability findings and remediation recommendations to stakeholders. • Support remediation planning and validate the More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor Skill Level 2 with Security Clearance

Annapolis Junction, Maryland, United States
Prime Time Consulting
requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Required Qualifications 5 years' experience in security … systems engineering or system assessment to include recent experience within the last 3 years in the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required. Bachelor's degree in Computer Science or Information Technology Engineering or related field of study is required. In lieu of a More ❯
Employment Type: Permanent
Salary: USD 201,829 Annual
Posted:

Security Control Assessor Skill Level 3 with Security Clearance

Annapolis Junction, Maryland, United States
Prime Time Consulting
requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification … and validation report (certification report) for the information system Required Qualifications 12 years experience in security, systems engineering or system assessment to include recent experience within the last 3 years in 5 or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required. Bachelor More ❯
Employment Type: Permanent
Salary: USD 234,485 Annual
Posted:

Security Control Assessor Level 3 with Security Clearance

Annapolis Junction, Maryland, United States
JASINT Consulting and Technologies, LLC
requirements that are not in compliance. Conduct on-site evaluations. Validate the security requirements of the information system. Verify and validate that the system meets the security requirements. Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system. Provide process improvement recommendations. Draft standards and … requirements and possible mitigations to requirements that are not in compliance Validate the security requirements of the information system Verify and validate the system meets the security requirements Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system Facilitate penetration testing Provide a comprehensive verification … and validation report (certification report) for the information system Position Requirements Minimum Requirements: Experience: Twelve (12) years experience in security, systems engineering or system assessment to include recent experience within the last three (3) years in five (5) or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and More ❯
Employment Type: Permanent
Salary: USD 155,000 Annual
Posted:

Information Systems Security Engineer (ISSE) - Senior with Security Clearance

Arlington, Virginia, United States
CGI
mitigation strategies, and implementing security controls to address identified vulnerabilities. • Security Compliance: Ensuring systems comply with relevant security policies, regulations, and standards, such as NIST, RMF, and ICD 503. • Vulnerability Management: Conducting vulnerability scans, analyzing results, and recommending remediation actions. • Security Documentation: Creating and maintaining security documentation, including system security plans, security assessment reports, and risk management … and its application to information systems. • Security Architecture: Understanding of secure system design principles and experience developing secure architectures. • Security Controls: Knowledge of various security controls and their implementation. • Vulnerability Assessment: Experience with vulnerability scanning tools and techniques. • Security Documentation: Ability to create and maintain security documentation. • Communication Skills: Excellent verbal and written communication skills to collaborate … share purchase plan • Paid time off for vacation, holidays, and sick time • Paid parental leave • Learning opportunities and tuition assistance • Wellness and Well-being programs Skills: English Security Architecture Vulnerability Management(IAVM) What you can expect from us: Together, as owners, let's turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and belonging. More ❯
Employment Type: Permanent
Salary: USD 173,500 Annual
Posted:

Information Systems Security Engineer (ISSE), Journeyman with Security Clearance

Arlington, Virginia, United States
Hybrid / WFH Options
CGI
mitigation strategies, and implementing security controls to address identified vulnerabilities. • Security Compliance: Ensuring systems comply with relevant security policies, regulations, and standards, such as NIST, RMF, and ICD 503. • Vulnerability Management: Conducting vulnerability scans, analyzing results, and recommending remediation actions. • Security Documentation: Creating and maintaining security documentation, including system security plans, security assessment reports, and risk management … and its application to information systems. • Security Architecture: Understanding of secure system design principles and experience developing secure architectures. • Security Controls: Knowledge of various security controls and their implementation. • Vulnerability Assessment: Experience with vulnerability scanning tools and techniques. • Security Documentation: Ability to create and maintain security documentation. • Communication Skills: Excellent verbal and written communication skills to collaborate More ❯
Employment Type: Permanent
Salary: USD 150,000 Annual
Posted:

Cyber Security Analyst with Security Clearance

Henderson, Nevada, United States
Consulting Services Group, LLC
and logistics. Our people bring unparalleled expertise and dedication and we are always looking to expand our team. Consulting Services Group (CSG) is seeking a cybersecurity analyst to execute vulnerability scanning and remediation operations within a geographically dispersed enterprise environment. This role encompasses network planning, assessments, and documentation support for compliance and accreditation purposes. Duties/Tasks and Responsibilities … Assist in installation, configuration, and execution of vulnerability and compliance assessment tools including Tenable products like Security Center, Nessus, Nessus Agents, and other application assessment tools. Assists in execution of vulnerability and compliance scans. Perform assessments autonomously with minimal supervision. Ensure scan results are accurate and coordinate authentication and scan failure issues with internal stakeholders. Track … software updates and upgrades of all vulnerability assessment and compliance tools to ensure all systems managed by the team are secure. Assist, review, and maintain documentation including methods and procedures for each of the security boundaries and the scan infrastructure Build and maintain dashboards that present actionable data to leadership and stakeholders in an intuitive manner to include More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Specialist/Officer with Security Clearance

Huntsville, Alabama, United States
Yulista Holding, LLC
demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control Assessor (SCA) under a Certification & Accreditation (C&A) and/or Assessment & Authorization (A&A) process. The specialist should demonstrate a working knowledge of the Risk Management Framework (RMF) process and/or include prior experience with the Defense Information Assurance … No KNOWLEDGE, SKILLS, & ABILITIES Required • Extensive knowledge and experience with the NIST Risk Management Framework and federal Government accreditation processes. • Skilled in providing technical support in the areas of vulnerability assessment, risk assessment, network security, product evaluation, and security implementation. • Proven success in designing and implementing solutions for protecting the confidentiality, integrity, and availability of sensitive information. … system contingency plans and other deliverables which maintain appropriate levels of protection and meet time requirements for minimizing operations impact to customer organization as well as Security Authorization and Assessment (A&A processes). • Ability to conduct security product evaluations, and recommend products, technologies, and upgrades to improve the customers security posture. • Strong writing skills to develop and maintain More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cybersecurity Engineer with Security Clearance

Herndon, Virginia, United States
Cherokee Federal
cyber threats and risk mitigation strategies, the Senior Security Engineer collaborates across departments to develop, implement, and maintain robust security measures, protocols, and policies. They lead security assessments, conduct vulnerability assessments, and respond to security incidents, demonstrating their expertise in intrusion detection, network monitoring, and security incident management. Compensation & Benefits: Estimated Starting Salary Range for SR Security Engineer … to and mitigating potential security incidents. Isolate non-compliant systems and initiate remediation processes to address security gaps and ensure compliance. Manage Tenable (Nessus) reporting and administration, performing regular vulnerability assessments, and generating actionable reports. Collaborate with cross-functional teams to implement security improvements and provide subject matter expertise on Azure cloud security. Stay up-to-date with the … field (or 5 years equivalent work experience), is required. 5-7 Years working in an IT Security role responsible for information security, network administration, and systems administration. Experience with vulnerability, patch management and configuration management. Experience with Microsoft Azure administration/security. Experience with Tenable administration Experience with mobile device management Familiarity with BigFix, BitLocker is preferred but not More ❯
Employment Type: Permanent
Salary: USD 127,000 Annual
Posted:

Vulnerability Management Analyst, Mid with Security Clearance

Washington, Washington DC, United States
Booz Allen Hamilton
Job Number: R Vulnerability Management Analyst, Mid The Opportunity: We are seeking an experienced Vulnerability Management Analyst to join our Security Operations Center ( SOC ) team. This role is critical in helping identify, assess, prioritize, and coordinate remediation of vulnerabilities across enterprise systems. The ideal candidate will bring deep technical expertise, advanced understanding of threat and vulnerability management … and the ability to work collaboratively with IT and cyber teams to reduce cyber risk. What You'll Work On: Operate enterprise vulnerability management process in support of continuous monitoring and RMF requirements. C ond uct regular vulnerability scans using tools such as Tenable and Qualys and interpret scan results. Validate and prioritize discovered vulnerabilities based on exploitability … administrators to track and measure remediation efforts and verify closure. Provide technical recommendations to mitigate risks identified through assessments. Create and maintain dashboards, metrics, and executive-level reports on vulnerability status and trends. Utilize knowledge of networks and operating systems such as Windows or Linux. Join us. The world can't wait. You Have: 5+ years of experience in More ❯
Employment Type: Permanent
Salary: USD 141,000 Annual
Posted:
Vulnerability Assessment
10th Percentile
£41,250
25th Percentile
£46,875
Median
£57,500
75th Percentile
£72,813
90th Percentile
£84,250