Information System Security Officer Key Role: Work with law enforcement to discover their cyber risks, understand...-critical systems. Act as an information security subject matter expert while broadening your skills in cloud computing and data...
Booz Allen Hamiltonand customer-oriented Information System Security Officer (ISSO) to join our team in Quantico, VA. Responsibilities include... configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security...
ManTechto Obtain: Top Secret/SCI Suitability: Public Trust/Other Required: None Job Family: Cyber Security Job Qualifications... that solve some of the world’s most complex technical challenges. The NCIS program is searching for Cyber Security Analyst...
General Dynamicsis currently seeking a qualified Cyber Security Engineer. The selected candidate’s primary jobs duties will involve configuring..., enterprise-wide incident response, and security information and event management (SIEM). Some examples of the 20+ cutting-edge...
Bering Straits Native Corporationand procedures. Establishes and satisfies system-wide information security requirements based on analysis of user, policy... to Obtain: Top Secret/SCI Suitability: Public Trust/Other Required: None Job Family: Cyber Security Job Qualifications...
General DynamicsMarathon TS is looking to hire a Systems Administrator (CYBER) to supporting the USAF in Quantico, VA. All candidates.... Develop and maintain schedules and plans for system updates and patching. Manage Group Policy Objects. Report on system...
Marathon TSJob Qualifications: Skills: ACAS, DISA STIG, SCCM Administration Certifications: Security + - Compt TIA Experience: 3 + years... of related experience US Citizenship Required: Yes Job Description: Join General Dynamics Information Technology (GDIT...
General Dynamicsthat prevent intrusions and breaches Analyze cyber system enterprise level requirements against approved architectures and system..., IT Security Audit, and Information Assurance Expertise in cybersecurity enterprise scanning and continuous monitoring...
ManTechcyber activity directed towards any DON entity or partnered organizations. Process and enrich information to ensure timely... and external sources of intelligence, review threat reports/feeds, and digest threat information into cyber threat intelligence...
ManTechthat prevent intrusions and breaches Analyze cyber system enterprise level requirements against approved architectures and system..., IT Security Audit, and Information Assurance Expertise in cybersecurity enterprise scanning and continuous monitoring...
ManTechan information system lifecycle. Ensure security incidents are investigated and reported in accordance with AR 25-2, to include...) and Information System Continuous Monitoring (ISCM) Strategy documentation. Support the Security Control Assessor (SCA) and AO review...
BAE Systems, and technical security controls and control enhancements employed within or inherited by a system to determine their overall... operation for the AO's consideration. Collaborates with other technology professionals to include cyber security, operations...
Federal government of the United Statesdocumentation Conduct cyber security scans, analysis of results, and provide recommendations for remediation of issues for improved.... Candidate must meet all qualifications, possess an active Security Clearance, and pass background investigation prior to hiring...
Bering Straits Native CorporationCompany Overview: Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization... multiple methodologies to provide necessary technical documentation, system requirements documents, systems security...
Innovative Management & Technology Servicesand systems comply with requirements and government information assurance and cyber security standards and practices through... Infrastructure, data network security measures, and Network Intrusion Prevention; and supports certification of Information Systems...
World Wide TechnologyCompany Overview: Join a fast-growing company highly experienced in cyber security, cloud computing, virtualization... multiple methodologies to provide necessary technical documentation, system requirements documents, systems security...
Innovative Management & Technology Servicesserver hardware. Perform system integration with Host Based Security System (HBSS). Must possess demonstrated proficiency... concepts, virtual and storage networking protocols, such as Fiber Channel protocols and Internet Small Computer System...
Tech Opps