- The MITRE Corporation (Mclean, VA)
- …ensure it can protect and defend information and systems from cyberattack and security vulnerabilities while performing duties in a complex and challenging ... (ML/AI) to enhance security activities and other automated capabilities. + Performs cyber analyses and assessments that support reduction of the cyber attack… more
- Transportation Security Administration (Springfield, VA)
- …ensuring freedom of movement for people and commerce. Responsibilities This Transportation Security Specialist ( Cyber Analyst) position is located in Operations ... to ongoing efforts to engage Aviation transportation operators to understand vulnerabilities to cyberattacks, and advocates for resilient cyber architecture… more
- Transportation Security Administration (Springfield, VA)
- …ensuring freedom of movement for people and commerce. Responsibilities This Transportation Security Specialist ( Cyber Policy) position is located in Policy, ... to govern cyber activities. Investigates and inspects transportation stakeholder cyber systems and vulnerabilities by considering a variety of cyberattack… more
- Leidos (Odenton, MD)
- …combines technology-enabled services and mission software capabilities in the areas of cyber , logistics, security operations, and decision analytics to support ... the world. **Your greatest work is ahead!** The National Security Sector (NSS) is hiring for a Lead Offensive... Sector (NSS) is hiring for a Lead Offensive Cyber Operations Planner to provide expert guidance and direction… more
- Leidos (Springfield, VA)
- …**Primary Responsibilities:** + Conduct comprehensive technical assessments to identify security vulnerabilities and weaknesses in information systems and ... and repeatability. Leidos has a critical need for a Security Controls Assessor to support the DHS Cyber...relevant Office of Management and Budget (OMB) Circulars, Executive Orders , Federal laws, directives, policies, and regulations. The DHS… more
- DHS Headquarters (Arlington, VA)
- …internal and external systems. Demonstrate strategic risk understanding, considering impact of security breaches or vulnerabilities in every aspect of the ... Summary The Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security ...employees in the application of laws, rules, regulations, executive orders , and current requirements to ensure DHS cybersecurity policies… more
- SAIC (Arlington, VA)
- …skills and apply critical thinking to identify, document, and communicate security program vulnerabilities and associated mitigation actions to internal/external ... **Description** SAIC is hiring an **Industrial Base Security and Acquisition Specialist** to support the Industrial Security Program Manager within the Office of… more
- Leidos (Odenton, MD)
- …(ArcSight, Splunk, Wireshark, etc..) + Knowledge of network and application protocols, cyber vulnerabilities and exploitation techniques and cyber ... Response organization. Requires a deep understanding and the ability to apply cyber security related principles, theories, and concepts. + Work independently… more
- Oasis Systems, LLC (Rockville, MD)
- …files, and / or CIS Benchmarks. + Knowledge of system and application security threats and vulnerabilities . + A working understanding of wireless networking ... optimize performance, and ensure success across various domains, from Cyber to Digital, Mission and Systems, servicing our nation's...+ At least one of the following certifications: CompTIA Security +, CISSP, ISACA CISA, GIAC GSEC, GIAC GSNA, GIAC… more
- Missile Defense Agency (Fort Belvoir, VA)
- …in developing new approaches in response to identified weaknesses and vulnerabilities of ongoing C-InT operations. Guide C-InT program activities including, case ... the National Insider Threat Task Force in compliance with federal law, executive orders and DoD Policy. Maintain liaison with the Undersecretary of Defense for… more
- NANA Regional Corporation (Washington, DC)
- …relate to cybersecurity. + Knowledge of cybersecurity principles. + Knowledge of cyber threats and vulnerabilities . + Knowledge of computer networking concepts ... over the entire contract effort including IDIQ and task/delivery orders . + Acts as the primary interface and point...and protocols, and network security methodologies. + Knowledge of specific operational impacts of… more
- NANA Regional Corporation (Washington, DC)
- …relate to cybersecurity. + Knowledge of cybersecurity principles. + Knowledge of cyber threats and vulnerabilities . + Knowledge of computer networking concepts ... Serves as the central point of contact for task/delivery orders and interfaces with the Contracting Officers Representatives for...and protocols, and network security methodologies. + Knowledge of specific operational impacts of… more
- Athenix Solutions Group, LLC (Mclean, VA)
- …usability fixes, changes, and enhancements as needed) and system scans for vulnerabilities , addressing any issues discovered, and installing security patches as ... engineering drawings, technical manuals, operating and repair instructions, engineering change orders , and Sponsor-provided systems. + Architect a new system for the… more