- UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout. Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RVPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years’ experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling. Coordinate with intelligence analysts to correlate threat assessment data.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience coordinating bug bounty and penetration testing engagements. Validating, triaging and driving the remediation of vulnerabilities discovered through internal testing, third-party penetration tests, or bug bounty programs.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment: Conduct regular vulnerability assessments and penetration testing to identify weaknesses in systems and applications. Perform penetration testing on customer information systems utilizing industry-standard penetration toolsets, document system configurations, hosts, URLs, and system diagrams, and review and test systems accounts and other users and system-defined configurations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation. Maintains the computer and information security incident, damage and threat assessment programs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8 years of experience with security assessment tools, vulnerability management, and penetration testing methodologies. Conduct comprehensive risk assessments, threat modeling, and vulnerability analysis to identify potential security gaps and develop mitigation strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience: 3+ years operational experience in the military, other Federal Government, or comparable civilian position in Cyberspace Operations (Offensive Cyberspace Operations, Defensive Cyberspace Operations, andCyberspace Exploitation), Cyber Red Team, Penetration Testing, and/or Information Operations (IO)Possess working knowledge of DoD’s Cybersecurity Vulnerability Alert and Incident Response process.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support new technologies transitioning and provide penetration testing services. Perform or support activities defined in the NIST RMF to obtain and maintain FISMA compliance; work with the Inspector General (IG) auditing team in support of FISMA audit and RMF assessment teams in support of the SA&A process.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possessd several industry-accepted security certification (e.g., CISSP, CISM, CCSP) Evaluate and select appropriate security technologies, tools, and practices to safeguard data, applications, and infrastructure within hybrid cloud environments.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintaintechnology/cyber capabilities including threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the Security Assurance and Application Security functions to develop and implement security testing procedures for AI models, including but not limited to penetration testing, code review, data assessment, etc.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions. Demonstrated current and significant relationships with NIH, HHS or comparable civil government executives and mid-level managers, particularly in IT operations, network and security services.
ExpandApply NowActive JobUpdated 8 days ago
threat assessment penetration testing jobs in Washington, DC
FEATURED BLOG POSTS
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.