- UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with incident handling procedures, network threat assessment, and analysis activities. Security Control Assessor Test Engineer (SCATE) Level 4 LV8D Solutions is looking for a Security Control Assessor Test Engineer (SCATE) to support red team / penetration tester activities in Step 4 of the Risk Management Framework (RMF) process to help ensure the secure operations of critical mission systems.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Candidate to perform security authorization activities in compliance with Risk Management Framework (RMF) policies and procedures; assist Information Assurance (IA) team in maintaining operational security posture; perform vulnerability/risk assessment analysis; provides configuration change management (CM) expertise for information system security software, hardware, and firmware and supports Change Advisory Board (CAB) meetings.
$160,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of the AWS shared responsibility model and its application; security controls for workloads on AWS; logging and monitoring strategies; cloud security threat models; patch management and security automation; ways to enhance AWS security services with third-party.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This department is focused on the integration and automation of technologies involved in vulnerability management and assessments. The Cyber Solutions Innovation Center is seeking a Cyber Assessments Department Manager; This leader is expected to strategically shape our growing and multi-disciplinary team, driving innovation in all areas of cyber assessment technologies, leading to significant impact – with particular emphasis in the department’s two formal technical capability areas of Cyber Assessments and Security Automation & Management.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficient in cybersecurity technologies and methodologies, including penetration testing, threat modeling, and risk assessment. Program Management Professional (PMP) Certification and/or Certified ScrumMaster (CSM), Certified Associate in Project Management (CAPM), Certified Project Manager (CPM.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in multiple IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support the security risk assessment of applications and infrastructure; including remediation of incident response, vulnerability analysis and threat intelligence. Do not provide identity/access control, risk management, vulnerability, penetration testing, architects or SOC/IR/Forensics/Threat Client candidates.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of AWS cryptography, encryption and key management best practices and policies. Experience implementing AWS cryptography, encryption and key management best practices and policies.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Serve as an enterprise subject matter expert (SME) and advocate of IT Security standards and reference architectures related to data-at-rest encryption management. · Stay current with developing technologies, emerging threat landscape and predict impact of changing technologies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Collaborating with internal and/or external cybersecurity professionals and experts in cybersecurity risk assessment/management, automated information sharing, threat analysis, vulnerability management, and network defense/network protection to assess risk, identify vulnerabilities and implement controls as necessary.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serving as an IT Specialist performing Information Security (INFOSEC) and Security System Management duties. Position supports the full lifecycle of the compliance program including orchestrating the program Plan of Action & Milestones (POAM), draft and shepherd architecture designs through the Sponsor’s Assessment & Authorization (A&A) process; procure, configure, and test site-specific architectures; organize, train, and equip Sponsor for distributed operations and maintenance.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience leading vulnerability management and reporting activities in response to DoD cybersecurity directives, orders, and alerts including leveraging the output of automated tools (e.g., Assured Compliance Assessment Solution (ACAS) Security Center, Host-Based Security System (HBSS), Tanium, SCCM.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contracts support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management , and Cyber Defense support.
ExpandApply NowActive JobUpdated 2 days ago
threat assessment vulnerability management jobs in Fairfax, VA
FEATURED BLOG POSTS
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.