to keep those systems safe. It’s the job of Cyber Systems Operations specialists to design, install and support our systems.... ASVAB SCORE REQUIREMENTS General Qualifications Knowledge of cyber system elements Completion of Cyber Systems...
U.S. Air ForceKaimetrix, L.L.C. is seeking a professional Subject Matter Expert Cyber – Level II /Systems Security Engineer... to join our team supporting the Air Force Life Cycle Management Center, Cryptologic and Cyber Systems Division (AFLCMC CCSD CT) in San...
Kaimetrixworking groups as a capability SME for defined cyber capabilities/tools and/or operations. Qualifications Basic..., Computer Engineering, or related disciple Desired Qualifications: Minimum 5 years of cyber operations or cyber support...
Peratoninstructors are required to be well versed in current USCYBERCOM Cyber Threat Intelligence Operations that leverage Cyber Threat...Leidos is searching for Cyber Intelligence Instructors for an upcoming opening that is supporting the United States Air...
LeidosDefensive Cyber Instructional Developer The Opportunity: Do you want to develop training that will transform... education. Constructing an interactive course that teaches critical cyber weapon system functionality requires a real passion...
Booz Allen Hamiltonand solutions, particularly in Offensive Cyber Operations. Key Responsibilities: Design, develop, enhance, debug, and implement... software solutions supporting Cyber Operations across defensive and offensive platforms. Conduct research, development, test...
Zachary Piper Solutionsand solutions, particularly in Offensive Cyber Operations. Key Responsibilities: Design, develop, enhance, debug, and implement... software solutions supporting Cyber Operations across defensive and offensive platforms. Conduct research, development, test...
Zachary Piper Solutionsfor cyber security solutions. You'll leverage cyberspace operations systems to aggregate threat feeds that inform briefings...Cyber Support Engineer The Opportunity: As a Cyber Support Engineer, you understand the value of hunt...
Booz Allen Hamiltonoffensive cyber operations. DUTIES Plan, research, and analyze computer Internet Protocol (IP) fundamentals, advanced IP... employment and executions of Air Force Cyber, and Joint CMF capabilities. Provide advanced instruction in creating CyO effects...
Tyonek Native Corporation-spectrum cyber, data operations, systems integration and intelligence support services to the U.S. government... future of our cybersecurity, intelligence, and services offerings. CODEX Overview CODEX (Cyber Offense and Defense...
Raytheon Technologiesoffensive cyber operations. DUTIES Plan, research, and analyze computer Internet Protocol (IP) fundamentals, advanced IP... employment and executions of Air Force Cyber, and Joint CMF capabilities. Provide advanced instruction in creating CyO effects...
Tyonek Native Corporationhas been providing some of the world’s most technically advanced full-spectrum cyber, data operations, systems integration... future of our cybersecurity, intelligence, and services offerings. CODEX Overview CODEX (Cyber Offense and Defense...
Raytheon Technologiessituational awareness, battle management, and cyber forces’ management for full-spectrum cyber operations. RESPONSIBILITIES...) Exempt position, supporting the ARNG 16 AF SPPFS. The Joint Cyber Command and Control (JCC2) SME supports missions...
Valiantlapses. Knowledge of systems administration concepts. Knowledge of the operations and processes for incident, problem... rights, and access to systems and equipment. Diagnose and resolve customer reported system incidents, problems, and events...
World Wide TechnologyCyber Security Vulnerability Assessment Analyst – TS/SCI Required Why WWT? At World Wide Technology, we work... solutions for our clients' most complex challenges. Location: San Antonio, TX What will you be doing? The Cyber Security...
World Wide Technology. At Watermark, our people come first! Information Systems Security Officer II The ISSO is responsible for ensuring the... of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system...
Watermark Risk Management Internationaland, in many organizations, is assigned responsibility for the day-to-day security operations of a system... of information systems to ensure compliance with the security authorization package Coordinate any changes or modifications...
Watermark Risk Management International