- UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience with privileged and elevated access using cybersecurity tools, including Palo Alto Firewalls, Trellix Endpoint Security Suite (ESS), former McAfee HBSS, ePO, FireEye tools, including MVX, NX, HX, PX, IA, AX, IAS PCAP, or malware and forensics analysis solutions, ForeScout, Splunk, Cribl, or ACAS.
$81,800 - $186,000 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) Perform automated ACAS scanning, STIG, SCAP checks (Evaluate STIG, Tenable Nessus, etc.) Report any breaches of cybersecurity policies to the Information System Security Manager (ISSM) and director of the facility (i.e., unauthorized devices.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must also possess knowledge of automated vulnerability scan tools (including Retina and ACAS) and have working knowledge of static source code tools (including Fortify and CAST) An IAM-III performing technical IAT functions will be required to attain a technical-level certification (CISSP / CISSP-ISSMP.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the development, management, and maintenance of cybersecurity solutions (e.g. Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), Vulnerability Remediation Asset Manager (VRAM), Public Key Infrastructure/Enabling (PKI/PKE), Security Information and Event Management (SIEM), Anti-virus, Data-at-Rest Encryption.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Shall have demonstrated experience performing vulnerability assessments with the ACAS tool. Defense Information System Agency (DISA) ACAS scans. NSWCDD-DNA's work is focused on providing engineering, acquisition, logistical, and Cyber Security support to the Navy, Marine Corp, Special Warfare Coalition, and Joint Forces.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CANES system administrationConfigure, update, and maintain ACAS with latest audits and signatures. Perform network vulnerability scans using ACAS per Program of Record (POR) or DoD directives.
Part-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the collection and use of data for our critical Information Assurance Vulnerability Management (IAVM) Program using various security tools (i.e. ACAS, HBSS, ADUC, Burp Suite, etc). Monitor identified vulnerabilities throughout their lifecycle from discovery to mitigation using ACAS, HBSS, STIG Viewer or other industry tools.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform cybersecurity testing as required, to include vulnerability scanning (ACAS), implementation of Security Requirements Guides (SRG) and/or Security Technical Implementation Guides (STIG), and Security Content Automation Protocol (SCAP) benchmarks.
$80,000 - $100,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Previous experience with Afloat Naval POR Systems (NIAPS, HBSS, ACAS). Utilize ACAS for vulnerability scanning purposes. Experience in maintaining US Navy Board of Inspection and Survey, and DoD Inspector General independent audits of HIPAA compliance and classified material control.
$68,400 - $143,700 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool. Must have a CFR, Cloud+, CySA+, GCED, GICSP or PenTest+ certification.
Full-timeExpandApply NowActive JobUpdated 18 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficient with use of Enterprise Mission Assurance Support Service (eMASS) and with reviewing / assessing Assured Compliance Assessment Solution (ACAS) scans. Must be a US Citizen Must hold a current Top Secret Clearance Essential Duties and Responsibilities Duties include, but not limited to : Provide cyber subject matter expertise to a variety of programs to ensure robust security architectures are designed and properly implemented within the DoD mandated Risk Management Framework.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain vulnerability scanning tool compliance, such as HBSS or ACAS, and patch management, such as IAVM to ensure IT staff pushes patches to all systems in an effort to maintain compliance with all applicable directives, manage system changes, and assess the security impact of those changes.
Full-timeExpandUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Shall have demonstrated experience performing vulnerability assessments with the Assured Compliance Assessment Solution (ACAS) tool. Associate Degree OR one of the following certifications (CAP, CASP+, Security+, SSCP.
$85,000 - $115,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Specific knowledge and experience of DIACAP and RMF are required as well as ACAS experience and DISA ACAS certification. Specific knowledge and experience of DIACAP and RMF are required as well as ACAS experience and DISA ACAS certification.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Specific knowledge and experience of DIACAP and RMF are required as well as ACAS experience and DISA ACAS certification Experience with eMass. Clearance Requirements: Active Secret security clearance For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.person status or obtaining any necessary license.
ExpandApply NowActive JobUpdated 10 days ago
acas job in Virginia Beach, VA
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.