- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree or higher from an accredited college or university in Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a degree in a Mathematics or Engineering field.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of threat intelligence, vulnerability management, and security incident response best practices. Cyber Incident Response Analyst with Security Clearance. Responsibilities include, but are not limited to: Incident Detection and Monitoring Incident Analysis and Investigation Incident Response and Mitigation Threat Intelligence and Vulnerability Management Reporting and Documentation Required Qualifications: 1+ years of experience in Cybersecurity, Information Technology or Computer Science.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Identify systemic security issues based on the analysis of vulnerability and configuration data. Conducting vulnerability scans and recognizing vulnerabilities in security systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a Cybersecurity Policy Analyst/Subject Matter Expert to support the DHS Office of the Chief Information Security Officer, National Security Cyber Division, National Security Systems (NSS) Governance Branch.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include, but are not limited to: Incident Detection and Monitoring Incident Analysis and Investigation Incident Response and Mitigation Threat Intelligence and Vulnerability Management Reporting and Documentation Details: Labor Category: Cyber Security Analyst Position Level: All Levels Salary: Up to $245,000.00 per year Core Hours: 9am to 4pm Location: McLean VA Mandatory Requirements: 1+ years of experience in Cybersecurity, Information Technology or Computer Science.
$245,000 a yearExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bank Secrecy Act: Remains cognizant of and adheres to Navy Federal policies and procedures, and regulations pertaining to the Bank Secrecy Act. Sr Mgr - Cyber Security Engineering. Understanding of general security technologies such as DLP, Web Application Firewall, and vulnerability scanning.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leading security practitioners on physical and corporate security, cyber threat intelligence (CTI), vulnerability management, and vendor risk management teams rely on Flashpoint to proactively identify and mitigate risk and stay ahead of the evolving threat landscape.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Security Analyst recommends information assurance/security solutions to support customers' requirements by performing vulnerability/risk analyses of computer systems and applications during all system development life cycle phases.
Full-timeRemoteExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
HOW A CYBER SECURITY PROJECT ENGINEER WILL MAKE AN IMPACT Create queries and alerts that feed into a dashboard for monitoring and analysis of various logs. Our work depends on a Cyber Security Project Engineer joining our highly skilled team to be a premier provider of cyber security services to the customer.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Background in security vulnerability studies and defense-in-depth strategy with existing and emerging technologies - router ACL, firewall, STIGs, Cisco/Arista bug assessments. We apply advanced technologies such as Artificial Intelligence, Blockchain, AR/VR, Cloud Native and Quantum Physics to solve our customers' missions in cyber, RF, undersea, interstellar and everything in between.
$122,235 - $135,604 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Analyst Senior Job Category: Information Technology Time Type: Part time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None Anticipated Posting End: There is not an anticipated end date for this posting since applications are needed on an ongoing basis.
ExpandApply NowActive JobUpdated 14 days ago
cyber security vulnerability jobs in Burke, VA
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).