- UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for interviewing organizational subject matter experts in conducting STIG, TIG, SRG, and IC policy checklists Collect data in support of reviewing a comprehensive Threat Informed Critical Controls List (TICCL), provide written input on review of required security controls, potential vulnerability exploitation, and how MITRE ATT&CK techniques are plausibly successful based on organizational weaknesses.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated expertise in multiple IT disciplines, including network architecture, cloud security, endpoint protection, vulnerability management, identity and access management, and incident response.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
2+ years of experience with supply chain risk management, including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We bring expertise with the National Institute of Standards and Technology (NIST) Special Publication (SP) 800-53 and the Risk Management Framework (RMF) to maintain secure, scalable, and highly available systems to meet the mission.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage Firewall, Web Filtering, Intrusion Prevention Systems (IPS), Intrusion Detection Systems (IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RVPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience using ServiceNow Project Portfolio Management. Possess the knowledge of security best practices, security solutions, and methodologies for risk management. Leidos Health Mission Solutions is seeking a Security Team Lead on a large network services opportunity supporting the National Institute of Health (NIH) in the Bethesda, MD area.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant work experience in Information Technology and Cybersecurity, including roles in SOC, Network/Security Engineering, Threat Intelligence, or similar domains. Strategic Advising: Serve as a trusted advisor to senior management, business units, and other stakeholders by offering recommendations on IT and cybersecurity strategies, policies, and procedures that align with organizational objectives.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Risk Management, in Supply Chain including assessing system and component criticality, mapping supply chains, identifying critical suppliers, assessing supply chain threat and vulnerability assessment, conducting risk identification and mitigation, and monitoring mitigation effectiveness over time.
$54,000 - $123,000 a yearExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
$83,550 - $178,603 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Active participation in the Information and Cybersecurity, Bank Vulnerability Management, and Data Loss Prevention programs including efforts related to vulnerability remediation planning, tracking, implementation, threat research, log analysis, end-user security education and training, and recommendations for process improvement.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Marriott Manager, Vulnerability Management Bethesda , Maryland Apply Now Schedule Full-Time. o Vulnerability scanning and assessment using Tenable.io. o Implementing, managing or using enterprise vulnerability assessment technologies, including Tenable.io, Tenable Security Center, or similar vulnerability solutions, is required.
ExpandApply NowActive JobUpdated 12 days ago
threat assessment vulnerability management jobs in Mclean, VA
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.