, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security...-performing team. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence...
, counterintelligence, risk and vulnerability assessments, military operations, investigations, technology protection, security...-performing team. Peraton Overview Peraton is a next-generation national security company that drives missions of consequence...
intelligence gathering and correlation with internal events. · Participate in security audits, vulnerability assessments.... Job Description Overview The ATPCO Security Operations (SOC) Internship is a 12-week program designed to give college students hands...
8510.01 RMF for DoD IT. - Review and analyze cybersecurity artifacts including System Security Categorization, Security Controls... Vulnerability Identification (CVI) and Adversarial Cybersecurity DT&E (ACD). - Analyze Assured Compliance Assessment Solution (ACAS...
of organizational security policies, through monitoring of vulnerability scanning devices. Work with the Information Assurance Team... of data within SPLUNK, IDS/IPS, ACAS, ESS (HBSS), FIREPOWER, and security related activities to secure and harden systems...
organizations. Provide certified and experienced vulnerability assessment analysts to conduct off-site system vulnerability... II) Offensive Security Profession Certification OR Global Privacy Enforcement Network (GPEN) Python Certification...
The Systems Security Engineer utilizes in-depth understanding and experience in current DoD Risk Management Framework..., Platform IT (PIT), and the implementation of Cyber Security and IA boundary defense techniques and various IA-enabled...
, and implement ServiceNow Security Operations (SecOps) solutions that enhance the customer's ability to detect, respond..., and remediate security threats. This hybrid role combines ServiceNow SecOps development, integration engineering, and process...
) environment to document security controls, track authorization status, and maintain continuous monitoring compliance. Advise... competent knowledge of the Risk Management Framework, Computer Network Defense, and Vulnerability Mgmt. Self starter...
. These services are required to address security risk management, compliance with federal privacy laws, information assurance.... Develop and implement security monitoring strategies and procedures to improve the organization's overall security posture...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
: Certified Ethical Hacker (CEH) CompTIA Security+ Intelligence Analyst Certified (IAC) Certified Threat Intelligence Analyst... to customer through proactively identifying, analyzing, and responding to cyber threats to inform the customer’s vulnerability...
detection system, SOC, cyber analyst, cyber engineer, cyber security engineer, cybersecurity engineer, server administration... Provider, CSSP Infrastructure Support, CEH, CHFI, CFR, Cloud+, network security, endpoint security, compliance, vulnerability...