Cybersecurity engineer
Camp PendletonVets Hired
...operating procedures Review Windows, Linux, cloud, network, and application STIGs, DoD SRGs, and vendor hardening guides Conduct ACAS vulnerability scans and generate reports with remediation recommendations Continuously monitor systems and applications for changes impacting security posture Provide daily cybersecurity [...]
Category IT & Telecommunications