- UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout. Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RVPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5+ years’ experience in Malware analysis, digital forensics, data/network analysis, penetration testing, information assurance, leading incident handling. Coordinate with intelligence analysts to correlate threat assessment data.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience coordinating bug bounty and penetration testing engagements. Validating, triaging and driving the remediation of vulnerabilities discovered through internal testing, third-party penetration tests, or bug bounty programs.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment: Conduct regular vulnerability assessments and penetration testing to identify weaknesses in systems and applications. Perform penetration testing on customer information systems utilizing industry-standard penetration toolsets, document system configurations, hosts, URLs, and system diagrams, and review and test systems accounts and other users and system-defined configurations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge of encryption, vulnerability assessment, penetration testing, cyber forensics, intrusion detection, and incident response and remediation. Maintains the computer and information security incident, damage and threat assessment programs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8 years of experience with security assessment tools, vulnerability management, and penetration testing methodologies. Conduct comprehensive risk assessments, threat modeling, and vulnerability analysis to identify potential security gaps and develop mitigation strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support new technologies transitioning and provide penetration testing services. Perform or support activities defined in the NIST RMF to obtain and maintain FISMA compliance; work with the Inspector General (IG) auditing team in support of FISMA audit and RMF assessment teams in support of the SA&A process.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possessd several industry-accepted security certification (e.g., CISSP, CISM, CCSP) Evaluate and select appropriate security technologies, tools, and practices to safeguard data, applications, and infrastructure within hybrid cloud environments.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintaintechnology/cyber capabilities including threat modeling of application designs, static application security testing (SAST), software composition analysis (SCA), dynamic application security testing (DAST), and penetration testing.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the Security Assurance and Application Security functions to develop and implement security testing procedures for AI models, including but not limited to penetration testing, code review, data assessment, etc.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience working with enterprise firewall, IPS/IDS, DNS, PKI, and remote access VPN solutions. Demonstrated current and significant relationships with NIH, HHS or comparable civil government executives and mid-level managers, particularly in IT operations, network and security services.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Plans and conducts assessment including but not limited to security engineering, vulnerability management, endpoint protection, web protection, external systems protection, threat hunting and penetration testing.
RemoteExpandApply NowActive JobUpdated Today
threat assessment penetration testing jobs in Bethesda, MD
FEATURED BLOG POSTS
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be