- IBM (Hampton, VA)
- …Responsibilities Position Location: Radford, VA OR Ft. Belvoir, VA- 5 days onsite The Cybersecurity Analyst will play a key role in ensuring systems meet ... and security standards. This role involves conducting in-depth analysis of vulnerability scan data, security configuration compliance reports and system design… more
- TestPros (Norfolk, VA)
- …+ Cisco Certified Network Associate - Security (CCNA Security) + CompTIA Cybersecurity Analyst (CySA+) + Global Industrial Cyber Security Professional (GICSP) ... lives better, safer and more secure. Job Summary The Cybersecurity Engineer will report directly to the CCM Project...and use of data for our critical Information Assurance Vulnerability Management (IAVM) Program using various security tools (ie… more
- Huntington Ingalls Industries (Norfolk, VA)
- …looking for a qualified individual to fill the role of a Cyber Security Analyst IV for the Navy Integrated Training Environment (NITE). You will be responsible for ... providing cybersecurity technical support to the Navy Enterprise Training Network. Position requires flexibility to work non-standard work hours and work weeks of… more
- Navy Exchange Services (NEX) (Virginia Beach, VA)
- Title: SECURITY ANALYST (INFOSEC - LEVEL IV) Location: United States-Virginia-Virginia Beach Job Number: 2400009P Job Summary: Serve as a Senior Information Security ... Analyst Alternate ISSM with responsibility of developing maintaining and...NEXCOM IAVM program. Maintain compliance with current DoD DON cybersecurity policy. Processes and reviews of System Security Reviews… more
- Amentum (Newport News, VA)
- …roles. The expected award timeframe is Fall/Winter 2024.** The Cyber Security Analyst will protect hardware, software, and networks from cybercriminals. The ... analyst 's primary role is to understand The US Army's...on the security of information systems + Conducts system vulnerability (ie ACAS) and STIG compliance scanning, as well… more
- COLSA Corporation (Fort Eustis, VA)
- …IT (PIT) systems during the acquisition process to include identifying cybersecurity requirements. . Review/complete RMF packages to include System Categorizations, ... (PWS), and other procurement artifacts to ensure they contain the appropriate cybersecurity requirements to be met by system developers. . Assist the program… more