Security/Compliance Manager
coordination. Vulnerability Management and Remediation Coordination: Review ACAS and Nessus/Tenable scan outputs. Coordinate...
coordination. Vulnerability Management and Remediation Coordination: Review ACAS and Nessus/Tenable scan outputs. Coordinate...
of the Starlink network. RESPONSIBILITIES: Responsible for evaluating design readiness for scan insertion through RTL... and physical design Scan Design Rule Check (DRC) tools Integration and verification of Design for Test (DFT) fabrics and IP...
of DFT/Scan/MBIST/LBIST and understanding of their impact on physical design flows Good scripting skills (csh/bash, Perl...
(PO&AM) as needed. Execution of continuous monitoring efforts responds to data calls, scan requests, and various weekly and monthly security...
(PO&AM) as needed. Execution of continuous monitoring efforts responds to data calls, scan requests, and various weekly and monthly security...
(PO&AM) as needed. Execution of continuous monitoring efforts responds to data calls, scan requests, and various weekly and monthly security...
and remediation solutions in an enterprise knowledge base. Support the Information Assurance Branch and the SOC with scan analysis... Ability to analyze DISA STIG audit compliance scan results and provide recommendations for resolution Analyze security...
and remediation solutions in an enterprise knowledge base. Support the Information Assurance Branch and the SOC with scan analysis... and confirm scan authentication Ability to analyze DAST output for proper configuration and vulnerability remediation...
and remediation solutions in an enterprise knowledge base. Support the Information Assurance Branch and the SOC with scan analysis... Ability to analyze DISA STIG audit compliance scan results and provide recommendations for resolution Analyze security...
Information System Security Officers (ISSO) with activities such as security scan analysis and partner with development teams... to analyze DISA STIG audit compliance scan results and provide recommendations for resolution Analyze security environment...