- UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Engineer will manage all aspects of infrastructure systems used to manage vulnerability management tools & resources. Monitoring, assessing, and maintaining systems and procedures to protect data systems and databases (ACAS/Nessus.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as the Information Systems Security Officer (ISSO) or Information Systems Security Engineer (ISSE) for the Robotics Process Automation (RPA) Program on behalf of the Modernization and Migration Management (M3) Program Management Office (PMO) by overseeing all aspects of security and ensuring compliance with Agency standards.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with vulnerability management and security auditing tools, such as Tenable or similar tools. CGI Federal is hiring a Senior-Level Information System Security Officer (ISSO) for FIPS moderate to high impact Cloud systems (IaaS, PaaS or SaaS) to work with a skilled and motivated team of professionals on a high-visibility Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) cyber security program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with Log Management, Vulnerability Management, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Firewalls, Network Access Control Systems (NACs), Identity Management systems and NetFlow Knowledge of cloud services such as AWS, Azure, or Google Cloud.
$70 - $75ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Specific systems include Tenable, Nessus, Invicti, Splunk, and other vulnerability management solutions (e.g., enterprise patch management). Responsibilities: The following duties and responsibilities include performing hands-on vulnerability scanning and management, patching systems, designing mitigation strategies, and authoring vulnerability-related products (including program doctrine, analysis reports, and other documents required as part of a formal VM program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with the Security Control Assessor to perform IT security assessments in support of Risk Management Framework (RMF). What You'll Be Doing:Conduct Vulnerability Assessment of network, host, and web applications, leveraging tools such as Tenable Nessus, NMAP, Wireshark, Rapid7 Metasploit, Burp Suite, etc.
$145,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience and expertise implementing Information Assurance strategy & guidance to include the Risk Management Framework (RMF) process, and vulnerability assessment and remediation. Experience and expertise managing all aspects of the Systems Engineering life cycle processes to include Concept Definition, System Definition, System Realization, System Development and Use, System Engineering Management, Product and Service Life Management, and Systems Engineering Standards.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working with Enterprise vulnerability management tools such as but not limited to: HBSS and Nessus. Draft, review, and update Risk Management Framework (RMF) artifacts required for FISMA Compliance.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Penetration Testing and/or Vulnerability Management. Professional certifications such as AWS Certified Solutions Architect and Certified Information Systems Security Professional (CISSP.
$234,700 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with maintaining vulnerability scanning tool compliance and patch management. Experience with the Risk Management Framework (RMF) to perform system Assessment and Authorization through a Governance, Risk Management, and Compliance (GRC) tool.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, test, and implement secure operating systems, network, security monitoring, tuning and management of IT security systems and applications, incident response, digital forensics, and loss prevention.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with IA Vulnerability Management, including ACAS scanning and patching. Perform system installation, configuration maintenance, account maintenance, signature maintenance, patch management, and troubleshooting of operational IA and CND systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Department of Defense (DoD) Risk Management Framework (RMF) information security requirements, standards, and best practices; DoD Information Assurance Certification and Accreditation Process (DIACP) compliancy with Retina, Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) and information assurance vulnerability alert (IAVA) patch management.
$175,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Description: This ISSO position is an entry to mid-level information system security professional providing support to all contract service teams for daily duties involving system compliance validation, vulnerability management response coordination, data transfer (Low to High and High to Low),and ongoing audit review and correlation, as well as general support to ongoing continuous monitoring activities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee the deployment and management of diverse cybersecurity tools, including intrusion detection systems (IDS), firewalls, endpoint protection, and SIEM solutions. As an Engineer IV - Information Security, you will be responsible for the implementation, management, and support of diverse cyber tools and infrastructure systems.
$179,300 a yearExpandApply NowActive JobUpdated Today
management systems vulnerability jobs in Fairfax, VA
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
Assistant Manager Resume Guide
It can be very challenging for many individuals to find a job in the current economy. As a result, the unemployment rate is only starting to decrease after being at its highest since the Great Depression. One of many reasons this is occurring is because this pandemic has encouraged people to quit their jobs to search for better working conditions, become entrepreneurs, or change careers.