Overview: Abacus Technology is seeking a Vulnerability Assessment/ACAS Security Manager to provide security... diploma or GED. Must be Security+ certified. Must have participated in training for DISA ACAS Supervisor and Operator and DISA...
Abacus Technology is seeking a Vulnerability Assessment/ACAS Security Manager to provide security and information... diploma or GED. Must be Security+ certified. Must have participated in training for DISA ACAS Supervisor and Operator and DISA...
Overview: SMS is seeking a dynamic, motivated individual to serve as a Senior or Mid-Level ACAS System Security... supporting the implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC...
. As the ACAS administrator, you will perform vulnerability assessment analysis and administration in this role... Compliance Assessment Solution (ACAS) including .SC (SecurityCenter™) and Nessus® scanners; Also 2.0 Architecture Components...
an individual for vulnerability assessment analysis and administration role with cybersecurity oriented principles to protect... implementation for Tenable products within Assured Compliance Assessment Solution (ACAS) including .SC (SecurityCenter™) and Nessus...
Overview: SMS is seeking highly motivated experienced Information Systems Security Manager (ISSM) in support... and analysis. Assist PMO with assessment and authorization process as needed. Track and validates security incidents...
to ensure compliance with the DoD PPS Category Assurance List (CAL) and DoD PPS Vulnerability Assessment reports... system security manager (ISSM) supporting classified programs. Experience in assessing and documenting test or analysis data...
to ensure compliance with the DoD PPS Category Assurance List (CAL) and DoD PPS Vulnerability Assessment reports... system security manager (ISSM) supporting classified programs. Experience in assessing and documenting test or analysis data...
, development, integration, assessment, and requirements analysis, as well as future capability needs (near and long-term) to drive... systems to include file system implementations, configuration management, security/software patches, updates, upgrades...
, or hardening security guidance Evaluate scan report data from ACAS Tenable.SC or Tenable Nessus Scanner, Evaluate-STIG, Security... Vulnerability Management Security (VMS) life cycle. Primary support provisional installation, configuration, operation...