on cyber threats, and audit log integration Ability to lead key program areas, such as Vulnerability Assessment, Penetration...Cyber Security Risk Management Expert The Opportunity: As a cyber mission specialist, you understand the value...
implementation and enforcement of security hardening, vulnerability management, scan analysis, data analysis for metrics reporting...Overview: The Cyber Risk Management Specialist (CRMS) will specialize in in-depth knowledge of the program's cyber...
implementation and enforcement of security hardening, vulnerability management, scan analysis, data analysis for metrics reporting...Overview: The Cyber Risk Management Specialist (CRMS) will specialize in in-depth knowledge of the program's cyber...
. Operations, Risk, and Strategy Threat & Risk Management: Lead comprehensive threat modeling and vulnerability management efforts..., lead implementation, and oversee the governance of cloud security solution for our IHS customer. This role is pivotal...
. Operations, Risk, and Strategy Threat & Risk Management: Lead comprehensive threat modeling and vulnerability management efforts..., lead implementation, and oversee the governance of cloud security solution for our IHS customer. This role is pivotal...
. Operations, Risk, and Strategy Threat & Risk Management: Lead comprehensive threat modeling and vulnerability management efforts..., lead implementation, and oversee the governance of cloud security solution for our IHS customer. This role is pivotal...
. Operations, Risk, and Strategy Threat & Risk Management: Lead comprehensive threat modeling and vulnerability management efforts..., lead implementation, and oversee the governance of cloud security solution for our IHS customer. This role is pivotal...
systems, network devices, and applications. Vulnerability Management: Work with security engineering to proactively identify... Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management...
teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture and Design, API...Senior Lead Information Security Office (ISO) Consultant At Capital One, you will help consult on initiatives...
, vulnerability mitigation, and application management, and collaborate with cross-functional teams to strengthen the overall security..., privilege management, and vulnerability remediation. Develop and enforce policies for device compliance and secure...
and laptops. Maintain and support enterprise Mac management tools (e.g., Jamf Pro) for patch management and configuration control... is stored in the designated Knowledge Management (KM) system. Security & Compliance: Implement and maintain security...
and other vulnerability scanners Experience with using compliance and risk management tools such XACTA, Splunk, Continuum... Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management...
Management Department (R311) within the Global Security Services Division (R300) is looking to fill a Senior Information Systems... concepts in classified settings. We seek a proactive individual to lead efforts in integrating security into large engineering...
Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management... consummate cyber security risk management “as a service” platform across multiple fabrics and centers. We have responsibility...
Management Department (R311) within the Global Security Services Division (R300) is looking to fill a Senior Information Systems... concepts in classified settings. We seek a proactive individual to lead efforts in integrating security into large engineering...
Experience with incident response plans, plans of actions and milestones (POA&Ms), risk management plans, and vulnerability..., and adaptive team that values innovation, collaboration, and professional development. As the Security Engineering Architect Lead...
strategy. We need your experience to lead the support, development, and implementation of security solutions that will protect... Hamilton for the better. What You’ll Work On: Management and administration of infrastructure firewalls, including day...
. Responsibilities Lead the design and implementation of secure, scalable cloud security architectures across GCP, Kubernetes..., and implementing remediation Execute vulnerability remediation workflows for application, container, Cloud, and SaaS vulnerabilities...
. Perform continuous monitoring activities, review security event logs, and validate vulnerability management effectiveness... to sensitive and confidential information. Contributions: The Principal ISSO serves as a Lead Cyber Security Specialist...
for a large government customer. This role offers a unique opportunity to lead a team of cybersecurity professionals and make..., monitoring, analysis, digital media forensics, cyber intelligence, vulnerability assessments, insider threat hunting, data feeds...