Portsmouth, Virginia
•
Today
Description Supporting the information system owner to complete security assessments, achieve system authorizations, continuous monitoring, and configuration management, through eMASSPerforming cybersecurity testing, analysis, and reporting by conducting the following: Assured Compliance Assessment Solution (ACAS) scans, Security Technical Implementation Guide (STIG) checks, port scanning, application code review, Risk Management Framework (RMF) control review, and Plan of Action and Milestone
Full-time














