Search Results: 46,116 vacancies
...and unmanned systems. For more information, visit tsd.huntingtoningalls.com.
HII Mission Technologies is looking for a Vulnerability Management Engineer.
Essential Job Responsibilities
The Vulnerability Management Engineer will:
Analyze, validate, demonstrate, and...
Suggested
Full time
Remote job
Worldwide
Shift work
...customers. Our capabilities include Program Management, Program Oversight, Process Audit,... ...secure.
Job Summary
The Cybersecurity Engineer will report directly to the CCM Project... ..., and reporting.
Monitor identified vulnerabilities throughout their lifecycle from...
Suggested
Holiday work
Full time
For contractors
Work experience placement
Local area
Remote job
...Gray Tier Technologies is seeking a Threat Detection Engineer for a new customer on a highly-visible... ...continuous monitoring
Develop, manage, and maintain Splunk data models
Review... ...areas related to cybersecurity: Vulnerability Assessment, Intrusion Prevention and...
Suggested
...Full Visibility is seeking a Mid-Level Mobile Security and Vulnerability Engineer to work in Quantico, VA. Candidate must possess an active... ...Deployment [CI/CD]
•Cloud Services & Unstructured Cloud Data Management
•Data Science, Data Visualization & Machine Learning...
Suggested
Local area
...contingent upon contract award.
Responsibilities
Insider Threat Engineering Specialists implement NGA's Scaled Agile Framework for the... ..., and architectures that establish the framework for the management of all Insider Threat Program IT.
They analyze, plan, design...
Suggested
Contract work
Description
SAIC is seeking Cyber Threat & Vulnerability Hunter to join its Blue Team Vulnerability Assessment Program in Chantilly, Virginia. This position requires an active TS/SCI Clearance with Polygraph.
Suggested
...security missions spanning infrastructure development and management, systems engineering, and administrative management which are transforming... ...Additional responsibilities include:
+ Performing detailed vulnerability assessments from researching secure technologies.
+...
Suggested
Contract work
...Group is seeking a Sr. Security Engineer:
POSITION: Senior... ...responsible for identifying potential threats to the IT infrastructure and... ...Conduct system security, vulnerability analyses, and risk... ...monitoring, and vulnerability management.
Maintain security posture...
Suggested
Remote job
...Cyber Threat Analyst
Location: Arlington, VA
Must have Top... ...in cyber incident management or cybersecurity operations... ...recognizing and categorizing types of vulnerabilities and associated attacks
- Knowledge... ...Automation & Cognitive Engineering company that integrates best...
Suggested
Holiday work
Contract work
Immediate start
Shift work
...successful cyber operations. We do this by finding the most talented engineers and operators in the country, give them some of the most... ...analysis and must be familiar with multiple classes of vulnerabilities. Additionally, you must be extremely comfortable communicating...
Suggested
Full time
...Lead Vulnerability Management Engineer, McLean, VA
We are seeking a Lead Vulnerability Management Engineer. The purpose of Cybersecurity Engineering... ...overall objectives.
– Assesses current and emerging threats, cyber attacks, and zero-day vulnerabilities that pose...
Suggested
Full time
...We are seeking a Cyber Threat Technician to join our team of cybersecurity professionals. The ideal candidate will have experience... ...incidents and take appropriate action to mitigate the risk
Conduct vulnerability assessments and penetration testing to identify and mitigate...
Suggested
...successful cyber operations. We do this by finding the most talented engineers and operators in the country, give them some of the most... ...an impact bigger than you can imagine. As an intern on the Vulnerability Research team, you will imagine weaknesses in multiple types...
Suggested
Full time
Internship
Overview:
Amyx is seeking to hire a Vulnerability Assessment Analyst-Intermediate to support our Cybersecurity Division/NGA Defender... ...Computer Science, Cyber Security, Information Technology, Software Engineering, Information Systems, or Computer Engineering degree; or a...
Suggested
Holiday work
Temporary work
Local area
Flexible hours
...Systems, Inc. is seeking a full-time Counter Threat Finance Analyst based inArlington, VA.... ...illuminate an adversary's financial vulnerabilities.
~(4) lists of interagency O.A.A.s... ...experience with reviewing, prioritizing, and managing submitted requests;
~ Understand...
Suggested
Holiday work
Full time
Contract work
Temporary work
Local area
Immediate start
Relocation package
Relocation bonus
Night shift
...Description:
The candidate will be working independently as a Vulnerability Researcher to identify flaws in software. The candidate must... ..., we will test you on both software development and reverse engineering skills as part of our hiring process. At this time, the...
For contractors
Local area
Remote job
Relocation package
...Knowledge and experience with ACAS Security Center (SC), Nessus Vulnerability Scanners (NVS), and Red Hat Enterprise Linux (RHEL). Possess... ...toolsets and processes to include STIGS, CAS, IAVA Management and Implementation, and OPORD/FRAGO support.
TECHNICAL...
For contractors
...operations, cyber defense and resiliency, vulnerability research, ubiquitous technical... ...services. Nightwing is seeking a Cyber Threat Intelligence Analyst to support this critical... ...familiarity with Intelligence Community management of information, classification,...
Holiday work
Contract work
Temporary work
Work experience placement
Immediate start
Remote job
Work alone
Flexible hours
...758; SUBJECT MATTER EXPERTS specializing in security and risk management. We're intimately familiar with DOD security programs and mission... ...401k savings plan. At Watermark, our people come first!
Threat Hazard Developer
This is a HYBRID-REMOTE position.
The Threat...
Hourly pay
Contract work
For contractors
Work experience placement
Remote job
...intelligence and operations support, program management, and international business development... ....**
**Responsibilities:**
+ Support Threat Finance Intelligence (TFI) analysis and... ...illuminate an adversary's financial vulnerabilities
+ (4) lists of interagency OAAs that...
Contract work
Local area