- UpvoteDownvoteShare Job
- Suggest Revision
Responsible for interviewing organizational subject matter experts in conducting STIG, TIG, SRG, and IC policy checklists Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK techniques are plausibly successful based on organizational weaknesses.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are hiring a Patch and Vulnerability Management Support for an exciting opportunity located in Ashburn, Va. Support development and implementation of Patch & Vulnerability Management (PVM) processes for end-user devices and infrastructure systems.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The program delivers Engineering, Operations, Cybersecurity, and Service Management in support of a) Windows 10 and Windows 11 platforms managed using Microsoft Endpoint Management solutions, Microsoft Endpoint Configuration Manager (MECM) and Microsoft Intune in a hybrid joined Azure and on premises co-managed Active Directory; and b) MacOS environment (MacOS Monterey, Big Sur, Catalina) using the Casper Administration Management (CAM) and JAMF mobile device management system.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability scanning, assessment and monitoring tools such as Security Center, Nessus, and Endgame. Desired Certifications:- GCFA, GCFE, EnCE, CCE, CFCE, CEH, CCNA, CCSP, CCIE, OSCP, GNFA.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SANS GCTI (GIAC Cyber Threat Intelligence) Utilize Threat Intelligence and Threat Models to create threat hypotheses. Leidos has an immediate need for a Cyber Threat Hunter to join our NOSC Cyber Team. The ideal Cyber Threat Hunter is someone who is process driven, curious, and enjoys identifying patterns and anomalies in data that are not immediately obvious.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical expertise in security engineering, system and network security, authentication and security protocols, cryptography, and application securityExperience with vulnerability scanning and testing tools such as: Burp suite, Rapid7 InsightVM, Tenable Nessus, Web Inspect, Net Sparker, DB Protect, App Detective, Prisma Cloud, Core Impact, Code DX and similar.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced Skills: Proficiency in using advanced vulnerability assessment and reporting tools such as Tenable, Splunk, and Tableau. Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK© techniques are plausibly successful based on organizational weaknesses.
$153,000 - $182,000 a yearFull-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in multiple IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Generate and design a variety of documentation and navigating associated processes such as System Security Plans (SSP), Plan of Actions and Milestones (POA&M), Interconnection Security Agreements (ISA), Information System Vulnerability Management (ISVM), Continuous Monitoring Strategies, Security Operation Center (SOC) strategies, Information System Contingency Plans (ISCP), Incident Response Plans (IRP), Configuration Management Processes, etc.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contracts Core Capabilities are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for the execution of DevSecOps functions in the areas of user support, application installations and upgrades, system vulnerability scanning, certificate management, analysis of security monitoring outputs, coordination of remediation patching, and other strategic DevSecOps initiatives.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a cyber threat specialist on our team, you’ll help customers solve problems using the latest software like Splunk, Carbon Black, Tenable, and SIEM products. Knowledge of cyber threat intelligence models, including MITRE ATT&CK, Kill Chain, and Diamond Model.
$84,600 a yearExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for Designing and Implementing Identity and Access Management for Azure DevOps. Experience working with ARM Templates and Experience with administering Identity and Access Management for Azure DevOps.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The AI Cybersecurity Researcher / Engineer will be expected to work with a small team to develop procedures in support of DHS’ Vulnerability Management Branch. Sustained (e.g., at least 10 years), hands-on experience with: data modeling and data engineering, feature engineering, model lifecycle management, and cloud infrastructure; supervised and unsupervised deep learning algorithms.
Full-timeExpandApply NowActive JobUpdated 5 days ago
threat assessment vulnerability management jobs in Herndon, VA
FEATURED BLOG POSTS
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.
10 Reasons HR is Important to an Organization
"Nothing we do is more important than hiring and developing people."
7 Importances of Organizational Culture and How to Build It
The world of work has drastically changed in the past few years. Where a good salary and a nice office might have been enough to attract talent in the past, employees today expect flexibility, growth opportunities, and a healthy work environment. In fact, 77% of applicants say they’d consider a company’s culture before applying for a job.
Collaborative Recruiting: The Key to a Better Talent Acquisition Strategy
Talent acquisition is a multi-stage process where candidates undergo various application steps before getting hired. The unfortunate reality is that it is a labor-intense system, with the hiring manager and recruiter often handling all of the work on their own. Ask any one of them, and you will hear about the overabundance of applications and the demanding task of filtering through them to find the best candidates. The quality of talent suffers under the weight of all that work on one person's hands. It's not easy, but as many companies are starting to realize, there is a better way. The future of talent acquisition lies in collaborative recruiting!
4 Talent Acquisition Trends Going Into 2023
For better or worse, a side effect of the COVID-19 pandemic was a marked shift in talent acquisition practices worldwide. With the struggle to retain talent that began in 2020, companies have had to rethink recruitment strategies. The result has been new talent acquisition trends that are well on their way to becoming commonplace. These are the practices that are going to become even more widespread going into 2023.
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?