Current jobs related to Vulnerability Assessment and Management SME with Security Clearance - San Antonio - Markesman Group


  • San Antonio, United States Sandoval Technology Solutions LLC Full time

    Job DescriptionJob DescriptionJob Summary:We are seeking a Cyber Subject Matter Expert (SME) with an active Department of Defense (DoD) clearance to join our team. The ideal candidate will possess a deep understanding of cybersecurity principles and practices, with a focus on securing government systems and data.Qualifications:- Bachelor's degree in...


  • San Francisco, California, United States Sonsoft Full time

    Job DescriptionSonsoft Inc. is a USA-based corporation with a strong presence in the fields of Software Development, Software Consultancy, and Information Technology Enabled Services.We are seeking a highly experienced professional to join our team as a Vulnerability Assessment Specialist. The ideal candidate will have a strong background in Business Process...


  • San Francisco, California, United States Target Labs Full time

    Position: Vulnerability Assessment ExpertOverview:This role is pivotal in providing technical leadership within the organization, involving direct supervision of team members and interaction with external partners. The primary focus is on conducting in-depth vulnerability assessments across a wide range of systems, including industrial control systems and...


  • San Antonio, United States Secure Innovations LLC Full time

    Why Work at SI? Secure Innovations (SI) successfully and continuously strives to become experts in the Cybersecurity field by only focusing on Cyber! Because of this, we proudly stand behind our motto, "We're Not Standard Cyber. We're the Cyber Standard." SI was built on the principle that people matter first and foremost. SI believes in providing a strong...


  • San Antonio, Texas, United States iNovex Information Systems Full time

    Job BriefWe are seeking a skilled System Vulnerability Analyst 2 to join our team. This role will involve conducting vulnerability analysis, penetration testing, and computer forensics to identify and mitigate potential security threats.Job DescriptionKey Responsibilities:Analyze existing systems and architectures to identify vulnerabilities and recommend...


  • San Francisco, California, United States Sonsoft Full time

    Job DescriptionSonsoft Inc. is a USA-based corporation specializing in Software Development, Software Consultancy, and Information Technology Enabled Services.Key ResponsibilitiesAt least 5 years of experience in Business Process Consulting, problem definition, Architecture/Design/Detailing of Processes.At least 4 years of experience in Vulnerability...


  • San Diego, United States MILLENNIUMSOFT Full time

    Job Title - Information Security Analyst [Vulnerability Management] Location - San Diego, CA or Franklin Lakes, NJ [Remote OK] Duration 12+ Months Work hours: 8am-5pm, 40 hours/week Client: Medical Device Company Employment Type: Contract on W2 (Need US Citizens Or GC Holders Only) Remote OK, would prefer NJ or San Diego Description: 3 must haves on the...


  • San Antonio, Texas, United States iNovex Information Systems Full time

    Job Title: System Vulnerability AnalystWe are seeking a highly skilled System Vulnerability Analyst to join our team at iNovex Information Systems. As a key member of our cybersecurity team, you will be responsible for identifying and analyzing vulnerabilities in our systems and developing effective countermeasures to mitigate potential threats.Key...


  • San Francisco, California, United States Alliance Sourcing Network,Inc. Full time

    Position Overview The Director of Vulnerability Management and Security Operations plays a crucial role in safeguarding the organization’s information assets. Reporting directly to the Chief Information Security Officer, this position is pivotal in ensuring the integrity and security of our IT infrastructure. Key Responsibilities Oversee a team of...


  • San Antonio, United States Diversified Technical Services, Inc Full time

    Job DescriptionJob DescriptionInformation Systems Security Officer (ISSO), Secret Clearance *Eligible for full time remoteDTSI is seeking an Information Systems Security Officer (ISSO) to deliver security solutions, guidelines, and controls within the DoD Risk Management Framework (RMF). This position will be part of a collaborative development team to make...

  • Atlassian SME

    2 months ago


    San Antonio, United States Zachary Piper Full time

    Join Our Team as an Atlassian SME at Zachary Piper Solutions!Are you a skilled Atlassian professionalseeking an opportunity to make a real impact? ZPS is seeking a qualified Atlassian SME to support a US Government Customer.Position Title: Atlassian Subject Matter Expert (SME)Location: San Antonio, TXPosition Description: As an Atlassian SME, you will play a...


  • San Antonio, Texas, United States Transportation Security Administration Full time

    Job SummaryWe are seeking a highly skilled and experienced Transportation Security Inspector to join our team at the Transportation Security Administration. As a key member of our organization, you will play a critical role in ensuring the safety and security of the American public by conducting transportation security inspections and investigations.Key...


  • san antonio, United States Applied Research Solutions Full time

    Applied Research Solutions is seeking a full-time Acquisition Program Management SME located at Lackland AFB, San Antonio, Texas.Why Work with us?Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous...


  • san antonio, United States Applied Research Solutions Full time

    Applied Research Solutions is seeking a full-time Acquisition Program Management SME located at Lackland AFB, San Antonio, Texas.Why Work with us?Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous...


  • San Antonio, United States Applied Research Solutions Full time

    Applied Research Solutions is seeking a full-time Acquisition Program Management SME located at Lackland AFB, San Antonio, Texas.Why Work with us?Applied Research Solutions (ARS) is respected as a world-class provider of technically integrated solutions as we deliver premier talent and technology across our focused markets for unparalleled, continuous...


  • San Antonio, Texas, United States Raytheon Technologies Full time

    About the RoleWe are seeking a highly skilled and experienced Technical Lead to join our Vulnerability Research and Exploitation team at Raytheon Technologies. As a Technical Lead, you will be responsible for driving the success of our customers by leading teams of vulnerability researchers and developing advanced security techniques.Key ResponsibilitiesLead...

  • Atlassian SME

    3 weeks ago


    San Antonio, United States Piper Companies Full time

    Join Our Team as an Atlassian SME at Zachary Piper Solutions! Are you a skilled Atlassian professionalseeking an opportunity to make a real impact?ZPS is seeking a qualified AtlassianSME to support a US Government Customer. Position Title: Atlassian Subject Matter Expert (SME) Location:San Antonio, TX Position Description:As an Atlassian SME, you will play...

  • ISSM I

    1 month ago


    San Antonio, United States Watermark Risk Management International Full time

    Job DescriptionJob DescriptionCome make your mark with Watermark!🎖️ FOUNDED BY USAF VETERANS in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.🌎 SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements.⭐ OUR CORE VALUES drive...


  • San Antonio, Texas, United States Booz Allen Hamilton Full time

    About the OpportunityWe are seeking a highly skilled Cybersecurity Training Developer to join our team at Booz Allen Hamilton. As a key member of our instructional design team, you will be responsible for developing and delivering training programs that meet the needs of our clients in the cybersecurity domain.Key ResponsibilitiesDesign and develop...


  • San Antonio, Texas, United States Booz Allen Hamilton Full time

    About the OpportunityWe are seeking a skilled Cybersecurity Training Developer to join our team at Booz Allen Hamilton. As a key member of our instructional design team, you will be responsible for developing training programs that meet the needs of our clients in the cybersecurity industry.Key ResponsibilitiesDesign and develop interactive training courses...

Vulnerability Assessment and Management SME with Security Clearance

5 months ago


San Antonio, United States Markesman Group Full time

Title Vulnerability Assessment and Management SME Location San Antonio Description Markesman Group is looking for a Vulnerability Assessment and Management SME to join our team in San Antonio, Texas. Vulnerability Assessment and Management SME performs assessments of systems and networks within the network environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy. They measure the effectiveness of defense-in-depth architecture against known vulnerabilities. Responsibilities: * Ability to identify systemic security issues based on the analysis of vulnerability and configuration data. * Ability to apply programming language structures (e.g., source code review) and logic. * Ability to share meaningful insights about the context of an organization's threat environment that improve its risk management posture. * Ability to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Knowledge of computer networking concepts and protocols, and network security methodologies. * Knowledge of risk management processes (e.g., methods for assessing and mitigating risk). * Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. * Knowledge of cybersecurity and privacy principles. * Knowledge of cyber threats and vulnerabilities. * Knowledge of specific operational impacts of cybersecurity lapses. * Knowledge of application vulnerabilities. * Knowledge of cryptography and cryptographic key management concepts * Knowledge of data backup and recovery. * Knowledge of host/network access control mechanisms (e.g., access control list, capabilities lists). * Knowledge of cybersecurity and privacy principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Knowledge of network access, identity, and access management (e.g., public key infrastructure, Oauth, OpenID, SAML, SPML). * Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL]). * Knowledge of programming language structures and logic. * Knowledge of system and application security threats and vulnerabilities (e.g., buffer overflow, mobile code, cross-site scripting, Procedural Language/Structured Query Language [PL/SQL] and injections, race conditions, covert channel, replay, return-oriented attacks, malicious code). * Knowledge of systems diagnostic tools and fault identification techniques. * Knowledge of what constitutes a network attack and a network attack's relationship to both threats and vulnerabilities. * Knowledge of interpreted and compiled computer languages. * Knowledge of different classes of attacks (e.g., passive, active, insider, close-in, distribution attacks). * Knowledge of cyber attackers (e.g., script kiddies, insider threat, non-nation state sponsored, and nation sponsored). * Knowledge of system administration, network, and operating system hardening techniques. * Knowledge of cyber-attack stages (e.g., reconnaissance, scanning, enumeration, gaining access, escalation of privileges, maintaining access, network exploitation, covering tracks). * Knowledge of network security architecture concepts including topology, protocols, components, and principles (e.g., application of defense-in-depth). * Knowledge of security models (e.g., Bell-LaPadula model, Biba integrity model, Clark-Wilson integrity model). * Knowledge of ethical hacking principles and techniques.Qualifications: * Must possess a Secret clearance. About the Organization About Markesman Group Markesman Group has gathered the nation's foremost experts in Cyber, ISR, Enterprise IT and Intelligence Analysis. We seek to lead with cutting edge technology, high quality development and best value services for both the government and commercial sectors. Our team combines passion, acumen, focus, patriotism, desire, dedication and the love for the job to create value for our customers. We pride ourselves in a rigorous selection process because not only do we want the best, we want the best to want us. Working closely together as part of a service-disabled veteran owned small business, we enjoy a family environment where teammates challenge and elevate each other every day. The Markesman family is always striving to solve tomorrow's problems, today. EOE Statement We are an Equal Opportunity/Affirmative Action Employer. We consider applicants without regard to race, color, religion, age, national origin, ancestry, ethnicity, gender, gender identity, gender expression, sexual orientation, marital status, veteran status, disability, genetic information, citizenship status, or membership in any other group protected by federal, state, or local law. This position is currently accepting applications.