Forensic Technician/Analyst provides advanced forensic, cybersecurity, and technical analysis support to NSWCDD across multiple... Technician/Analyst works independently with minimal oversight, may supervise junior analysts, and serves as a senior technical...
such as IAM, endpoint protection, logging/monitoring, vulnerability management, segmentation, and backup/recovery strategies...Sentinel Blue is looking for a CMMC Compliance Analyst to join our Operations team. This role is ideal...
Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management... Job Qualifications: Skills: Cloud: Amazon Web Services (AWS), Continuous Monitoring, Risk Management Framework (RMF), Standard...
. We are in search of a highly motivated candidate to join our talented Team. Job Title: Security Engineer/Cyber Security Analyst.... Location: Chantilly, VA. Role Summary We are looking for an experienced Security Engineer or Cybersecurity Analyst...
Description : Job Summary As a Senior SOC Analyst, you will serve as a senior lead responsible for monitoring.... Participate in red teaming and blue teaming and IR exercises. Vulnerability Management & Compliance Support vulnerability...
and system owners Work with Vulnerability Management to assist with developing and implementing threat-informed patch..., Penetration Testing, Red Teaming, Network Security Management, Cyber Risk Management, Cloud Security, Vulnerability Management...
management, system hardening, data retention and disposal, encryption, key management, anti-virus, vulnerability management... like you then please read on! THE ROLE We are seeking a highly motivated and detail-oriented Senior Analyst to join our Cyber...
) Baseline configuration deviation reviews Vulnerability management Oversee and participate in CMS MARS-E, ARC-AMPE, and FISMA...Title: Security Analyst – Consultant (8803) Location: 1201 Main Street, Suite 600, Columbia, SC 29201 Work Mode...
Analyst to support the Missile Defense Agency (MDA). In this role, you will strengthen enterprise cyber defenses by conducting... threat emulation, vulnerability analysis, incident response, and cyber operations assessments. You will contribute directly...
consultant will lead and enhance security, compliance, and risk management activities for systems governed by FISMA, NIST, CMS... strong experience in risk management, FISMA programs, technical auditing, and eGRC tools. Daily Responsibilities Support and lead...
Title: Security Analyst – Project Lead (8780) Work Location: 1201 Main Street, Suite 600, Columbia, SC 29201 Work... risk assessment, vulnerability management, and incident response. 3+ years of experience preparing for and actively...
efficiency. Security Assessments: Lead comprehensive security evaluations, vulnerability analyses, and facilitate cyber... Samuel Ginn Col of Engineering Position Title Senior Cybersecurity Analyst, McCrary Institute Job Class Code JA32...
, escalating significant incidents to senior analysts or management. Perform vulnerability assessments, assist with remediation... to Us: Foundational to intermediate knowledge of information security concepts, incident response, and vulnerability management. Advanced...
for endpoint protection, web security, vulnerability management, and access control. Monitor user activity and system behavior...Position: Senior IT Security Analyst Employment Type: Full-Time Location: Hybrid / Flexible Position Summary The...
management systems, operating systems, disaster recovery, incident management, vulnerability management, risk assessment, IT... criteria, and recommendations for management, lead audit closing meetings, and ensure all audit documentation is finalized...
management systems, operating systems, disaster recovery, incident management, vulnerability management, risk assessment, IT... criteria, and recommendations for management, lead audit closing meetings, and ensure all audit documentation is finalized...
Monitoring & Logging: using Azure Monitor, Log Analytics, and Application Insights Security and Vulnerability management: RBAC.... Virtual Machine Management: Provisioning, scaling, and securing VMs. VM images, extensions, and availability zones Configure...
rule reviews (ports, protocols, services) Configuration deviation requests Vulnerability management reviews Audit...The Senior ISSO will report to the ISSO Team Lead within OCS and serve as an experienced cybersecurity consultant...
, servers, database management systems, operating systems, disaster recovery, incident management, vulnerability management... reports outlining findings, risk criteria, and recommendations for management, lead audit closing meetings, and ensure...
, servers, database management systems, operating systems, disaster recovery, incident management, vulnerability management... reports outlining findings, risk criteria, and recommendations for management, lead audit closing meetings, and ensure...