- Eisai, Inc (Nutley, NJ)
- …monitoring systems, applications and information handling solutions. Conducts risk and vulnerability assessment of the network, enterprise systems and critical ... best practices. This may include: policies and SOPs defining vulnerability capture, organization and prioritization, oversight of mitigation/resolution, confirmation,… more
- Dexian - Signature Consultants (Dallas, TX)
- …wherever possibleIdentifying and deploying cybersecurity measures by continuously performing vulnerability assessment and risk managementIncidence management and ... root cause analysisCoordination and communication within the team and with customersSelecting and deploying appropriate CI/CD toolsStrive for continuous improvement and build continuous integration, continuous development, and constant deployment pipeline… more
- Galapagos Federal Systems, LLC (Honolulu, HI)
- …the Information Assurance staff, ensuring the achievement of Information Assurance Vulnerability Assessment (IAVA) compliance for both decentralized and central ... systemsThoroughly document work in current ticketing systems, consistently updating the status of open tickets on a weekly basisResolve tickets promptly upon work completion and update pending tickets based on estimated completion datesEffectively track and… more
- Imagine One Technology (Lexington Park, MD)
- …and Risk Scoring (CMRS)Experience with performing STIG implementationExperience performing vulnerability assessments with the Assured Compliance Assessment ... Trends Analyst (305)JQR Information Assurance Vulnerabilities Management (VAAP - Vulnerability Analysis and Assistance Program) Experience in the following areas:… more
- Imagine One Technology (Virginia Beach, VA)
- …experience: Performing STIG assessments to include using SCAP benchmarks Performing vulnerability assessments with the Assured Compliance Assessment Solution ... (ACAS) tool Using eMASS Developing Plans of Actions and Milestones (POA&M) entries Completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity Communicating risk reduction recommendations to… more
- Sunrise Systems inc (Atlanta, GA)
- …CWIS. Strong understanding of security principles, including secure coding practices, vulnerability management, threat modeling, and risk assessment . Strong ... experience with containerization technologies such as Docker and container orchestration tools like Kubernetes (Redhat OpenShift preferred). Demonstrable experience on securing containerized environments and integrate security into container workflows.… more
- Data Recognition Corporation (Maple Grove, MN)
- DRC is one of the largest educational assessment and curriculum/instruction companies in the industry. Data Recognition Corporation Senior Cyber Security Engineer ... aspects of the security practice, including application and cloud security, vulnerability management, identity and access management, security detection and incident… more
- Dexian - Signature Consultants (Chicago, IL)
- …of malicious and inappropriate activity; ensure consistency of the risk assessment approach across the organizationSupport policy updates; research and recommend ... application-layer firewalls and secure network design; infrastructure and application-layer vulnerability management, security information and event management (SIEM); Security,… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …(1) year hospice experience. Other: NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible and ... Specific and Unique Knowledge, Skills and AbilitiesStrong clinical nursing and assessment skillsAbility to understand, interpret and adhere to regulations, agency… more
- Lennar Mortgage (Miami, FL)
- …protocols, and best practices. Proficiency in security technologies, risk assessment , compliance standards, relevant regulations (eg, NIST) - Strong ability ... to identify vulnerabilities and improve incident response procedures. Risk Assessment and Mitigation: - Identify potential security risks and vulnerabilities… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …Membership is professional organization NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible and ... Essential Tasks and ResponsibilitiesClinical Skills and Knowledge: Demonstrates basic assessment skills. Demonstrates the 5 rights of medication administration.… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …a multi-disciplinary setting preferredOther: NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible ... team. Plans and updates interventions in response to ongoing assessment . Monitors progress towards goals. Monitors and plans for...in the search for meaning, peace, purpose.Conducts grief needs assessment at the time of death and collaborates with… more
- Russell Tobin & Associates (New York, NY)
- …in the US and be able to come in and conduct a thorough assessment of the current Windows on-premises environment. Document the existing systems, configuration, and ... recovery, failover, load balancing, and full redundancy Perform systems & firmware vulnerability patch management and other tasks to main security compliance Respond… more
- Galapagos Federal Systems, LLC (Melbourne, FL)
- …modified security hardware, operating systems, and software applicationsEnsures the assessment and implementation of identified computer and network environment ... with specific technical vulnerabilities as part of the Cybersecurity Vulnerability Management programGuides the implementation of appropriate operational structures… more
- RIVET OPERATIONS COMPANY LLC (Dededo, GU)
- …operational risks on systems and networksContractor must have experience with utilizing vulnerability tools to conduct automated scans such as Assured Compliance ... Assessment Solution (ACAS) or Nessus and Security Content Automation Protocol (SCAP)Contractor must have experience with writing standard operating procedures (SOPs)… more
- DivIHN Integration Inc (Atlanta, GA)
- …capabilities and provide guidance and support to teams risk managing assessment findings. 6. Improve operational efficiency and grow Ethical Hacking capabilities ... the latest tools, tactics, techniques, procedures, and developments in vulnerability research, exploitation, privilege escalation, defense evasion, lateral movement,… more
- Northeast Georgia Health System, Inc (Gainesville, GA)
- …Requirements: Preferred Experience: Other: NGHS Core Competencies 1. I Show Vulnerability when I:trust others and assume positive intent.am emotionally accessible ... to meet department staffing needs.Completes unit specific annual competency assessment requirements (Success Factors & Clinical Competency Checklist) within specific… more
- V2Soft (Troy, MI)
- …Project Management* PMP, Agile, ASPICE Certifications* Experience supporting & managing vulnerability and incident management activities* Knowledge of ISO 21434, and ... UN ECE R155* Knowledge of common risk assessment methodologies.* Familiar with cybersecurity mitigations (encryption, certificate management, TLS, wireless… more
- Leidos (Ashburn, VA)
- …a Masters' degree. At least two years of direct experience in vulnerability assessment /management. Familiar with the management, operational, and technical ... considered. Must be US Citizen. **Primary Responsibilities** Information Security Vulnerability Management + Continuously research emerging threats to the… more
- BlueHalo, LLC (Annapolis Junction, MD)
- …with us. Are you ready to launch a career at BlueHalo? As a Senior Vulnerability Assessment Analyst with our Intel Division, you will perform assessments of ... accredited college or university + Ten (10) years' experience as a Vulnerability Assessment Analyst + Active TS/SCI with a Polygraph Certifications (at least one… more
Related Job Searches:
Assessment,
Cyber Vulnerability Assessment Analyst,
Senior Vulnerability Assessment Analyst,
Threat Vulnerability Assessment Analyst,
Vulnerability,
Vulnerability Assessment Analyst,
Vulnerability Assessment Engineer,
Vulnerability Assessment Penetration Tester,
Vulnerability Assessment Red Team,
Vulnerability Assessment Team Manager