and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer's success. Work with Brilliant People We don't just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer's success. Work with Brilliant People We don't just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer's success. Work with Brilliant People We don't just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯
and Authorization (A&A) packages for various systems Develop and maintain security documentation such as: Authorization Boundary Diagram System Hardware/Software/Information Flow System Security Plan Privacy Impact Assessment e-Authentication Implementation Plan System Level Continuous Monitoring Plan Ports, Protocols and Services Registration Plan of Action and Milestones (POA&M) Conduct annual FISMA assessments Perform Continuous … applications are Firewalls, Intrusion Detection System (IDS), Intrusion Prevention System (IPS), Switch/Routers, Cross Domain Solutions (CDS), EMASS and, Endpoint Security Solution (ESS) Performing STIG implementation Performing vulnerability assessments with the ACAS tool Remediating vulnerability findings to include implementing vendor patches on both Linux and Windows Operating systems Education: Bachelor of Science in Information Systems, Bachelor of Science … Innovative Technology SimVentions takes pride in its innovative and cutting-edge technology, so you can be sure that whatever project you work on, you will be having a direct impact on our customer’s success. Work with Brilliant People We don’t just hire the smartest people; we seek experienced, creative individuals who are passionate about their work and More ❯