improve performance & security Collaboration & Communication: partner with other engineers, analysts, and stakeholders to implement solutions Create & maintain clear documentation of system designs, procedures & updates Tools & Technologies: use tools like Nmap, Nessus, & tcpdump for network analysis Strong emphasis on Cisco ISE or ForeScout for network access control Knowledge of Windows/Linus systems, TCP/IP networking & 802.1x security protocols Qualifications … of network routing, switching & firewalls Experience with Cisco Identity Services Engine (ISE) or ForeScout Familiar with Comply-to-Connect (C2C) systems & related infrastructure Proficient with network security tools like Nmap, Nessus, and tcpdump Understands TCP/IP, 802.1x, and general network security concepts Experience with Windows and Linux systems Scripting knowledge: Shell, Perl, XML, IAT Level II (GSEC, Security+, SSCP More ❯
and two (2) years of penetration testing experience. In addition, the individual shall have demonstrated ability and/or experience in the following areas: • Tester using tools such as nmap, nessus, dsniff, libnet, netcat, and network sniffers and fuzzers. • Exploit identified vulnerabilities. • Develop methods to defend against identified vulnerabilities and exploits. More ❯
C2C enterprise-level expertise to the customer base a plus • Experience with Cisco Identity Services Engine (ISE) • Knowledge of Shell, Perl and XML Scripting • Experience with tools such as Nmap, Nessus, and tcpdump Clearance Requirements: • Must have a current/active TS/SCI w/Polygraph Physical Requirements: • The person in this position must be able to remain in More ❯
3. Demonstrated experience developing IT system or network architecture design, conducting IP data flow analysis, encryption configuration, and vulnerability analysis using both open-source and commercial tools, such as Nmap, Wireshark, Metasploit, Canvas, Kismet, or BackTrack. 4. Demonstrated experience analyzing IT network configurations of devices such as firewalls, routers, switches, VPNs, or Intrusion Detection/Prevention Systems for cyber security More ❯
testing tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). Skill in reviewing logs to identify evidence of past intrusions. Skill in conducting application vulnerability assessments. Skill in performing impact/risk assessments. Skill to develop insights about More ❯
Risk Management Framework (RMF), NMAP, PKI, Wireshark, auditing, penetration testing, scripting, IASAE, CISSP, ISSEP, NISCAP Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen Must have TS/SCI clearance w/active polygraph Bachelor's degree in Computer Science … have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
enterprise-level expertise to the customer base a plus. Experience with Cisco Identity Services Engine (ISE). Knowledge of Shell, Perl and XML Scripting. Experience with tools such as Nmap, Nessus, and tcpdump. Physical Requirements: Must be able to remain in a stationary position 50% of the time. Occasionally move about inside the office to access file cabinets, office machinery More ❯
Plans (IRP) Configuration and Contingency Plans POA&Ms, Risk Management Plans, and audit artifacts Manage continuous monitoring and security auditing processes Interface with scanning and compliance tools (e.g., NESSUS, NMAP, Rapid7) Act as a cybersecurity SME across a broad Linux-based enterprise system Advise on and evaluate security architectures and controls Cross-train and support across other infrastructure components Required … encryption Software/hardware lifecycle security Understanding of RMF and frameworks such as: NIST SP 800-37 CNSS publications Hands-on experience with security compliance and monitoring tools: NESSUS, NMAP, WebInspect, AppDetective, SNOW Security certifications: Security+ or CISSP (required) Experience supporting A&A testing and evaluations Ability to communicate security practices clearly with development teams Analyze and validate security designs More ❯
testing tools and techniques. Skill in the use of social engineering techniques. (e.g., phishing, baiting, tailgating, etc.). Skill in using network analysis tools to identify vulnerabilities. (e.g., fuzzing, nmap, etc.). Skill in reviewing logs to identify evidence of past intrusions. Skill in conducting application vulnerability assessments. Skill in performing impact/risk assessments. Skill to develop insights about More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
Wood Consulting Services, Inc
Security Engineering Professional (ISSEP) and CISSP Certifications are required. Demonstrated expertise in: Risk Management Framework (RMF) Security policy formulation and assessment Vulnerability testing and mitigation Security tools (e.g., Nessus, NMAP, Wireshark) Secure OS configurations and system hardening Strong communication skills and ability to work in fast-paced, collaborative environments. Experience with system security engineering across the full system lifecycle. About More ❯
connectivity, Document network problems and resolution for future reference. Experience with Linux network troubleshooting tools and features to solve complex network issues (tcpdump, ssldump, curl, wget, mtr, tcp traceroute, nmap, openssl, tshark ,QoS, MPLS, BGP, VoIP, Security, etc.) Clearance Requirements: Must have a current/active TS/SCI w/Polygraph. Physical Requirements: Bending, carrying, kneeling, lifting, light work More ❯
Squid) Firewalls including Checkpoint, IPFilter, and Sidewinder Intrusion Detection/Prevention Systems including Snort and Argus Network management solutions including Open View and Network Node Manager Network utilities including nmap, tcpdump, sniffers, ipconfig, and wireshark Shell scripting Experience with managing networks at different security classification Experience with DoD security tools and procedures (STIG, ACAS, eMASS) Remedy ticketing system Active Secret More ❯
templates for network standardization Monitors system performance and implements performance tuning Use of Linux network troubleshooting tools to solve complex network issues (tcpdump, ssldump, curl, wget, mtr, tcp traceroute, nmap, openssl, tshark) Develop bash and/or python scripts, utilities and tools used for network troubleshooting Troubleshoot various DNS, SMTP, IP routing, latency, and connectivity issues Implement TCP/IP More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP, and Wireshark; hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. Must have demonstrated knowledge of and experience with common security tools, such as Nessus, NMAP, and Wireshark hardware/software security implementation, communication protocol, encryption techniques/tools, and web services. Must have experience with secure configurations of commonly used desktop and server operating systems. More ❯
Assurance Management (IAM) Level II proficiency Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, NetworkMapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top More ❯
Security Practitioner (CASP) or equivalent certifications Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, NetworkMapper (NMAP), and/or similar applications Preferred Qualifications: A bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline Clearance Requirements: Must have a current/active Top More ❯
Instruction 8570.1. IAM Level III proficiency. Experience with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP Weblnspect, NetworkMapper (NMAP), and/or similar applications Preferred Qualifications: Bachelor's or advanced degree in Computer Science, Cybersecurity, or other cyber discipline is Clearance Requirements: Must a current/active Top Secret More ❯
how to navigate those tools and assisting projects with steps needed to complete authorization Xacta or Greenlight 360 compliance and risk assessment application tool Rapid7 scanning and vulnerability remediation NMAP scans Splunk Administration knowledge and skills Securing and monitoring enterprise level Cisco network, VOIP, and VTC devices Administering, securing and monitoring enterprise level Windows and Linux network infrastructures Desired Experience More ❯
Nessus, NMAP, Wireshark Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must have TS/SCI clearance w/active polygraph Must be a US Citizen This position is open to multiple levels of years of experience; two (02) years within the last five More ❯