- Insight Global (Oakton, VA)
- …Government contractors. -Responsible for Forensic analysis, Cyber hunting, Proactive threat detection & analysis, Malware reconstruction and Packet analysis. -Become ... as requested. -Understand how attackers leverage TOR and Dark Web sources to sell exploits and stolen data. -Identify...and stolen data. -Identify and respond to potential insider threat activity. Validate VDPs from public bug bounty sources.… more
- Koniag Government Services (Washington, DC)
- …(SIEM), Security Orchestration Automation and Response (SOAR), Data Loss Prevention (DLP), Web Application Firewalls (WAF), Threat Intel, Endpoint Security ... Duties may include, but are not limited to:** + Review and technical inspection of cloud systems, identifying and...Experience deploying resources into and running workloads in Amazon Web Services and/or Microsoft Azure + Ability to clearly… more
- General Dynamics Information Technology (Fort Belvoir, VA)
- …Level Must Be Able to Obtain:** Secret **Job Family:** Web Development **Skills:** Application Development,Computer Programming,Group Problem Solving,Languages, ... Yes **Job Description:** Deliver simple solutions to complex problems as a Web Developer Senior at GDIT. Here, you'll tailor cutting-edge solutions to the… more
- Ryder System (Washington, DC)
- …or a related field, required. + Five (5) years or more strong understanding of web application security and common attack vectors. (eg SQL injection, XSS, CSRF), ... in application security and knowledge of programming languages and web technologies. A Bachelor's degree in Computer Science and certifications such as… more
- Amazon (Arlington, VA)
- …with in-depth understanding of application security assessment methodologies such threat modeling, secure design reviews, secure code review , and penetration ... will lead the strategic direction and evolution of the Application Security review team/s, including setting goals...knowledge of information security technologies such as security design review , threat modeling, secure code review… more
- Amazon (Herndon, VA)
- …and Users as they learn how to maximize tools, services, and offerings in Amazon Web Services (AWS). Join us as we build and operate learning experiences that allow ... In a given day, you might be inspecting an application 's and Lab code for security issues, building a...Own security design and architecture choices (includes architecture reviews, threat modeling, code reviews and security testing). * Machine… more
- EPAM Systems (Mclean, VA)
- …with security tools and technologies such as static and dynamic analysis tools, web application firewalls, etc + Proficiency in programming languages commonly ... career journey? Apply now! We are seeking an accomplished Application Security Architect to join our team and play...points in current processes and make recommendations + Perform threat modeling, security architecture review , and risk… more
- Rubrik (Washington, DC)
- … application security, with experience across SDLC activities such as threat modeling, secure code review , vulnerability management, and penetration testing ... as FedRAMP, SOC2, ISO 27001. + Broad knowledge of web , application , and cloud attack vectors and...norms that have prevented equal representation. This means we review our current efforts with the intent to offer… more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- Georgetown Univerisity (Washington, DC)
- …systems and their applications, but with a security focus and understanding of the threat landscape. As well, they have the expertise to address the issues of today, ... with leading AI, communications, and smart vendors + Experienced with Amazon Web Services (AWS), Google Cloud Platform (GCP), Microsoft Azure. + General knowledge… more
- General Dynamics Information Technology (Washington, DC)
- …our team to provide administrative and technical support to law enforcement and threat intelligence operations that support the highest levels of government. When we ... performs assessments to determine pattern of life attributes and the identity of threat actors. + Has knowledge of forensic analysis of digital information and uses… more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- Chenega Corporation (Washington, DC)
- …and/or scripts that test all APIs provided by the customer against the Open Web Application Security Project (OWASP) API Top Ten (or alternate criteria as ... to function on a mobile device. + Experience assessing web applications and websites Application Programming Interfaces...To help you with your research, we suggest you review the following links: Chenega MIOS web … more
- GliaCell Technologies (Laurel, MD)
- …standard software stacks. GliaCell's Enterprise capabilities include Full-Stack Application Development, Big Data, Cloud Technologies, Analytics, Machine Learning, ... and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and… more
- PenFed Credit Union (Mclean, VA)
- …the integrity and availability of all hardware, resources, systems, and key processes. Review system and application logs, and verify completion of scheduled ... systems in a phased approach of requirements analysis, system design review , installation, integration, and testing. + Lead the development of product/project… more
- Georgetown Univerisity (Washington, DC)
- …systems and applications may have weaknesses that can be exploited by external threat actors and potentially lead to a breach. Given that cyber endpoint health ... + Proficiency with SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, and automation and response… more
- General Dynamics Information Technology (Chantilly, VA)
- …make a personal impact as a Senior Communications Specialist supporting Insider Threat and Counter-Intelligence activities. GDIT is your place to make meaningful ... the contract as a technical writer / editor to establish, implement, and review policy and procedures for coordinating efforts within the program. Additional support… more
- Chenega Corporation (Arlington, VA)
- …feel prepared and confident. To help you with your research, we suggest you review the following links: Chenega MIOS web site - www.chenegamios.com Glassdoor - ... **Responsibilities** + Develop and maintain a knowledge of changing regulatory, threat , and technology landscapes to continually develop or maintain security… more
- AECOM (Arlington, VA)
- …correspondence. + This job is 100% computer-based and work is completed through a web -based application , so strong computer skills are required. + If selected ... to provide technical assistance that may include: + Collect, coordinate and/or review applicant data to determine eligibility and priority of assignments to include… more
- Amazon (Arlington, VA)
- …2 or more areas of security engineering practices such as in web application security, network security, authentication and authorization protocols, ... responsible for influencing Amazon services through the creation of threat mitigation plans. You will work directly with internal...- Partner with AWS developers to drive improvement in application security as a result of security review… more