- UpvoteDownvoteShare Job
- Suggest Revision
GDIT is seeking an RCDD Engineer to join our Joint Service Provider Enterprise Transport Management - Next-Gen (JSP ETM - NG) program at the Pentagon in Arlington, VA. Due to the nature of work this role entails, telecommuting is not allowed and will require the employee to report full-time onsite.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton's DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.
$104,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidate must possess an active DOD Top Secret/SCI level security clearance, and be eligible to obtain and maintain a CI/Poly. Define, update, and extend Program Configuration Management (CM) team structure and provide training to CM team as needed.
$108,550 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Interface with program management and customers regarding program-unique Security requirements. + Deliver a comprehensive and consistent Security solutions for program management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of the National Industrial Security Program (NISPOM) and Department of Defense regulations. Applicants must have an active Secret security clearance, with the ability to obtain a Top-Secret clearance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
MUST HAVE ACTIVE SECURITY CLEARANCE Responsibilities of the Cyber Risk Manager:· Oversee all aspects of cybersecurity program management, including risk management, compliance, incident response, and vendor management.
$120,000 - $140,000 depends on experience (negotiable)ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Providing input, as tasked by SAF/IA senior leadership, Division Chief/Deputy Chief, and the SAF/IA Country Director, to USAF Security Cooperation Enterprise stakeholders including the AF Life Cycle Management Center (AFLCMC) and various USAF Weapon and System Program Offices for action and response to Partner Nation Government/MoD and Air Force.
$145,000 - $155,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet),Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Engineer, design, install and support security technologies such as Data Loss Prevention (DLP), Host Intrusion Prevention (HIPS), Security Incident and Event Managers (SIEM), Endpoint Security, Vulnerability Management (VM), Email user and entity behavior analytics, Certificate Management, SSL encryption and decryption, Identity Management, Cloud Security, Database Security, Web Gateways.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Secret Security Clearance. Koniag Professional Services, a Koniag Government Services company, is seeking a Speech Writer with a Secret Clearance to support KPS and our government customer at the Pentagon.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: - SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) - RSA Security Analytics (NetWitness) - Symantec Bluecoat - Cisco FirePower (SourceFire) - Splunk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A minimum of an Active Secret Security Clearance is required. An Active Secret Security Clearance is required. The ideal candidate will have experience performing congressional notification tracking, and program analyst duties and have a good understanding of NATO as well as Foreign Military Sales (FMS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate office administrative functions including office security administration, office space management, processing security clearance and visit requests for OUSD(P) personnel and visitors, scheduling office events and ordering supplies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
NAOVI is seeking a Cyber Security Engineer applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks to elevate the security posture of the program.
ExpandApply NowActive JobUpdated Today
program management secret security jobs Title: acquisition in Arlington, Dothan, Alabama
FEATURED BLOG POSTS
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: