- Suggest Revision
- The program provides support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a federal customer.
- The contract s support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
- Integrate and/or implement security with Cross Domain Solutions (CDS) for use within an IS and Network Environment
- Design, develop, and implement network security measures that provide confidentiality, integrity, availability, authentication, and non-repudiation
- Ensure that network system(s) designs support the incorporation of client directed cybersecurity vulnerability solutions
- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with the use and operation of security tools including Tenable Nessus and/or Security Center, IBM Guardium, HP WeblInspect, Network Mapper (NMAP), and/or similar applications.
ExpandApply NowActive JobUpdated 28 days ago We’re looking for a Cybersecurity assessor who can help create solutions for our customer that will stand up to even the most advanced Cyber threats.
eResilience is a leader in the fight against cyber threats and if you have in-depth experience in RMF/CSF/NIST and share our values, then WE NEED YOU!
- UpvoteDownvoteShare Job
- Suggest Revision
At least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruction 8570.1 IAM Level III proficiency.
Full-timeExpandApply NowActive JobUpdated 31 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 3 years serving as an Information Systems Security Officer (ISSO) at a cleared facility. Familiarity with the use and operation of security tools including Tenable.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with patch and vulnerability management processes and tools (e.g., Tenable Nessus). Assured Compliance Assessment Solution (ACAS) trainingSecurity RequirementsCandidate must be a US Citizen and possess (as well as maintain) a Final Secret Clearance and meet the eligibility requirements to obtain (and maintain) a Final Top Secret Clearance.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experienced in Information Security, Internal Audit and/or IT Risk Management functions. Establishes strict program control processes and policies to ensure mitigation of risks and supports obtaining certification and accreditation of systems.
Full-timeExpandApply NowActive JobUpdated 31 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Computer Science or related discipline (four years of ISSO/Intermediate Level Cybersecurity experience may be substituted for a Bachelor's degree. Evaluating, interpreting, and writing RMF Policy and Procedure documentation.
ExpandUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the planning, organization, maintenance and compliance of multiple classified systems in accordance with NISPOM, Risk Management Framework (RMF) requirements, and Defense Counterintelligence and Security Agency (DCSA) Assessment & Authorization Process Manual (DAAPM.
$80 - $100Full-timeExpandApply NowActive JobUpdated 31 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in a DOD Information Security contractor security environment with demonstrated knowledge of managing classified information systems operation and security.
ExpandApply NowActive JobUpdated 31 days ago Security Analyst Certificate
ArticleThe below is optional but can help make you a top candidate: A degree in computer science, information security, or a related field.
A great applicant for this opportunity is someone who has a professional background and the technical expertise in the technology they are teaching.
- UpvoteDownvoteShare Job
- Suggest Revision
Assist with the performance of Information Security Engineer duties in eMASS as defined in the RMF.Help draft and maintain documentation associated with the Assessment and Authorization process.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
US Citizenship with the ability to obtain and maintain a Secret security clearance Preferred Requirements: Knowledge of ACAS, NESSUS, SPLUNK, SCAP, POA&Ms, NIST, DIACAP, NISPOM, system audits, vulnerability scanning, and RMF package development.
ExpandUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of Information Assurance (IA) systems: Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), Nessus. Experience with Virtual Machines and hardware virtualization technology (VMWare, Hyper-V.
Full-timeExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the Risk Management Framework (RMF) in a classified environment while helping to identify and implement overall security requirements for the proper handling of data and provide guidance for development and operational efforts regarding information assurance (IA) functions, particularly those focusing on IA planning, infrastructure protection, and defensive strategy.
ExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the DevSecOps team consisting of system administrators, application administrators, configuration management, program ISSO, developers, and DBAs. Familiarity with the Risk Management Framework, the experience with DoD Assessment and Authorization process for a DoD Information System.
ExpandUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Multifactor Authentication and PKI. Experience with patching and deploying software products and updates using Microsoft Windows Server Update Services (WSUS) Must have Security+ CE or CISSP Certification and Operating System Certification (Windows.
Full-timeExpandUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Management - Nessus vulnerability scanning and reporting. Incident Response Team (IR/IRT) troubleshooting, root cause analysis, and remediation verification. We are looking for a Cyber Security Analyst to help plan, implement, and maintain a Security Operations Center (SOC) program.
ExpandUpdated 11 days ago