- UpvoteDownvoteShare Job
- Suggest Revision
Support the security risk assessment of applications and infrastructure, including remediation of incident response, vulnerability analysis and threat intelligence. Knowledge of AWS cryptography, encryption and key management best practices and policies.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Active participation in the Information and Cybersecurity, Bank Vulnerability Management, and Data Loss Prevention programs including efforts related to vulnerability remediation planning, tracking, implementation, threat research, log analysis, end-user security education and training, and recommendations for process improvement.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeRemoteExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability scanning tools and close familiarity with Vulnerability Management. Installation, monitoring, testing, troubleshooting, and administration of the ACAS/Nessus Vulnerability Scanner.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support Assessment and Authorization (A&A) cybersecurity reviews, identify gaps, and support risk management plans for cybersecurity personnel to execute. Experience reviewing and developing of RMF Assessment and Authorization (A&A) documentation, e.g., System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POAMs.
ExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years’ experience with vulnerability assessment and reporting, including comprehensive understanding of vulnerability management methodologies and procedures, web application assessment, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Developing and updating security authorization packages in accordance with the client requirements and compliant with FISMA. Core documents that you will be responsible for are the System Security Plan (SSP), Risk Assessment Report, Security Assessment Plan and Report, Contingency Plan, Incident Response Plan (IRP), Standard Operating Procedures (SOP), Plan of Actions and Milestones (POA&M), Remediation Plans, Configuration Management Plan (CMP), etc.
$135,000 - $155,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support ISSO/ISSM with Assessment and Authorization (A&A) requirements and drafting/updating security related RMF documentation. Review and analyze systems architecture diagrams and networks to identify technical security requirements based upon the Risk Management Framework (RMF.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in the evaluation and implementation of industry-standard enterprise-wide information security technologies and concepts, including but not limited to: SEIM, Application Security, Cloud Security (AWS), Data Loss Prevention, Security Event Management, Threat and Vulnerability Management and Identity and Access Management.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5 or more years of experience with information security including threat detection/mitigation, vulnerability management, user awareness, email firewall security, identity/access management, endpoint protection, firewall/IDPS security, auditing and risk assessment, incident response, data loss prevention, and policy development.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficient understanding of diverse cybersecurity technologies, including SIEM, EDR, IDS/IPS, Firewall, Vulnerability Management, Identity and Access Management, and the Zero-Trust approach, among others.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
8 years of experience with security assessment tools, vulnerability management, and penetration testing methodologies. Conduct comprehensive risk assessments, threat modeling, and vulnerability analysis to identify potential security gaps and develop mitigation strategies.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Integrate and configure security tools, such as SIEM (Security Information and Event Management) systems, intrusion detection systems, and vulnerability scanners, for continuous monitoring and threat detection.
ExpandApply NowActive JobUpdated 4 months ago
threat assessment vulnerability management jobs in Takoma Park, MD
FEATURED BLOG POSTS
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are