POSITION OVERVIEW: The IT Security Analyst II position applies mid-level principles and moderate to highly complex... position focuses on offensive security tasks such as penetration testing, vulnerability assessments, and red teaming exercises...
McIntire Solutions is seeking a motivated, career and customer-oriented Cyber Security Analyst, Incident Response..., urgency, and potential impact; identify the specific vulnerability and make recommendations which enable expeditious...
Information Security Analyst Redstone Arsenal/Huntsville, AL IPTA's Technology Solutions Team is passionate... expertise is required to support all levels of Risk Management Framework (RMF) Accreditation. Candidate will need...
where the MPCO IS are dependent on them. Ensure good cybersecurity and vulnerability management practices are developed... design management control of build processes for servers, services, and end points. Comply with hosting facility ATOs...
Management Framework (RMF) Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions...: Cybersecurity, Information Assurance, Plan of Action and Milestones (POA&M), Risk Management Framework Certifications: None...
, NIST CSF-171, SOC1 II, etc. Perform annual risk assessment and monitor the progress of remediation efforts Perform... matrix, and the risk register Support the management of security documentation such as policies, standards, processes...
assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance... supporting information assurance guidelines and customer requirements. Perform vulnerability/risk analyses of computer systems...
Must have active IAT II certification (Security+ CE, GIAC Security Essentials Certification (GSEC), CySa+, CEH, CISM, etc.) Working..., Phishing, Ransomware, Social Engineering, Trojan, Vulnerability, Zero-Day Exploit, Advanced Persistent Threat (APT...
School Diploma or equivalent with 9 years of experience is required Must have a DoD 8570 IAM level II (or higher) security... of classified systems and Risk Management Framework Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system...
such as compliance audits and active evaluations such as vulnerability assessments. - Enforce strict program control processes... is completed to include auditing, configuration management, hardware inventory, software inventory, user training, POA&M updates...
Management Framework (RMF) Must meet DOD 8750 requirements and be eligible for IAM level II access upon hire for positions...: Cybersecurity, Information Assurance, Plan of Action and Milestones (POA&M), Risk Management Framework Certifications: None...
information and event management (SIEM) solutions, vulnerability management tools and threat intelligence platforms Familiarity... readiness for real-world incidents Perform vulnerability scans, analyze results, and assist in remediation efforts to reduce...
Bachelors Degree (e.g. Cybersecurity, Engineering, Computer Science, or related IT fields) and Active DoD 8570 Level II... of Enterprise Mission Assurance Support Service (eMASS) Knowledgeable with Supply Chain Cyber Risk Management (SCRM) Knowledge...
(NIST) security controls, Risk Management Framework (RMF), DIACAP, and other Navy / DoD security compliance processes... Secret clearance, ability to upgrade to Top Secret Eligible for CSWF IAT II (Security+ Min) Desired Skills: CISSP...
, Forensic, Signals, Exploitation etc) Vulnerability Analysts Data Analysts Penetration Testers Malware Analysts... Others… General Overview Be part of a team of diverse backgrounds performing ongoing, comprehensive vulnerability assessments...
in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate... (ATO) Utilizing vulnerability scan, port scan, compliance, and network analysis tools (e.g. ACAS, Nessus, NMAP, SCC...
in accordance with Risk Management Framework (RMF) to achieve an Interim Authorization To Test (IATT) or Authorization To Operate... (ATO) Utilizing vulnerability scan, port scan, compliance, and network analysis tools (e.g. ACAS, Nessus, NMAP, SCC...
manage a large-scale project for the implementation of a complex DLP, vulnerability management applications. 8... to as Candidate(s), who meets the general qualifications of Project Manager 3, Project Management and the specifications outlined...
project for the implementation of a complex DLP, vulnerability management applications. 8 years Managing up to three staff... and Security Web Information Systems using SaaS vulnerability management and DLP applications. 5 years Familiar managing when...
(IAT) Level II certification: CompTIA Security+ CE (Continuing Education) CompTIA Cybersecurity Analyst (CySA+) CE...Overview: The AFINC II contract supporting the 26th Network Operations Squadron (26NOS) is seeking qualified Router...