- UpvoteDownvoteShare Job
- Suggest Revision
The task will require the Cybersecurity Engineer to provide IA support directly related to information security (INFOSEC), computer security, communications security (COMSEC), continuity of operations planning (COOP), risk management framework (RMF), and information technology (IT) management on the Joint Worldwide Intelligence Communications System (JWICS) and National Security Agency Network (NSANet.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Key elements of this position include: Capture and refine information security requirements and ensure their integration into information technology components and information systems: Perform vulnerability assessments, to determine weaknesses and exploit methods in systems/networks; Perform cybersecurity analysis and hardening of complex IT systems; and conducting cybersecurity mitigations on design solutions to comply with Risk Management Framework (RMF) cybersecurity requirements.
$81,250 - $146,875 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Title Cyber Systems Engineer (MDT) Location Chantilly, VA US (Primary) Job Type Full-time Category IT Security Job Description The program provides Systems Engineering and Technical Assistance (SETA) support in the areas of Cybersecurity and Management to improve the Information Assurance (IA) posture of a National customer.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Position Summary BayFirst Solutions, a subsidiary of Versar, Inc., is seeking a Senior Security Tools Engineer to support the DHS’ Homeland Security Enterprise Network (HSEN) within the Office of the Chief Information Officer (OCIO), IT Operations, Enterprise Engineering Division (EED.
Full-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Assurance Leadership: Lead and implement robust Information Assurance processes, ensuring compliance, security, and resilience of systems within the IT infrastructure, adhering to industry standards and best practices.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of system security engineering in accordance with the process, task, and activity guidelines established in DOD Instruction 8510.01 Risk Management Framework (RMF) for DoD Information Technology (IT.
$107,658 - $179,431 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Engineer/Information Assurance Technician (IAT-II) Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Continental US.
$65,000 - $136,500 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Contractor shall assist in developing and documenting SCRM plans and implementation activities in appropriate acquisition and security documents, including but not limited to the acquisition strategy, SEP, PPP, and SSP. Education: Recommend computer engineer, electrical engineer or computer science ABET accredited degrees or BS in information assurance or information systems.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
All the personnel on the team will work together to support innovative design, engineering, procurement, implementation, operations, sustainment and disposal of user facing and data center information technology (IT) services on multiple networks and security domains, at multiple locations worldwide, to support the IC mission.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working on U.S. Government contract proposals as an Information Assurance Engineer subject matter experienced professional. Experience with usage of information security toolsets including anti-virus, Vulnerability Assessment, HIDS/ NIDS. host-based or endpoint security solutions, Multi-Factor Authentication (MFA), and Security Incident and Event Management (SIEM) and centralized auditing resources.
Full-timeExpandApply NowActive JobUpdated 1 month ago
FEATURED BLOG POSTS
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.