- UpvoteDownvoteShare Job
- Suggest Revision
The IT Systems Administrator will be serving in the Office of the Information Technology (OIT)/Finance and Administration to support the agency's IT operations, infrastructure, and security operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis. The contract’s support functions are: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with implementing and managing the following technologies Device Provisioning, Windows Autopilot, Creation and Configuration of device policies, Software Packaging & distribution, Windows OS and software patching, reporting in Intune using Graph Explorer and API. To be successful in this position, the candidate will be responsible for managing the endpoint devices within our organization, ensuring that they are secure, up-to-date, and functioning at peak performance.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Basic Qualifications: US Citizen with the ability to secure US Federal Security Clearance Bachelor's degree or higher in Computer Science, Information Technology, Engineering, Engineering Management, Management Information Systems, or related STEM degree program, or related equivalent additional experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform Application Security Testing using (Nessus, IBM App Scan, HP Web Inspect, Fortified on Demand, Qualys, Burp, or Retina) Oversee, evaluate, and support the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization’s information assurance, security, and privacy requirements.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Investigates and writes reports on accidents, incidents, suspicious activities, safety and fire hazards and other security related situations. As a company with two decades of experience, our clients include the Department of Homeland Security, Federal Protective Services (DHS/FPS); Department of Defense, Pentagon Force Protection Agency (DoD/PFPA), Department of the Army and Department of State, Bureau of Diplomatic Security (DoS/DS) National Aeronautics and Space Administration (NASA), Environmental Protection Agency (EPA) and Department of Energy (DOE.
$24 an hourPart-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A high school diploma or equivalent is required to become an Enlisted Sailor in the cryptology field in the Navy. Those seeking a Cryptologic Technician position must be U.S. citizens who can meet eligibility requirements for a Top Secret/Sensitive Compartmented Information security clearance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As Principal HR Data Analyst, this hands-on role will drive HR data discovery and collection, data security, data cataloging, data transformation, data analysis, data visualization, and reporting in support of the organization’s overall HR Data & Reporting objectives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Review and understand information system security compliance, including system connectivity (administrative, technical and organizational factors) and develop risk management alternatives for securing environment requirements based on understanding of the application and environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We touch on aspects of application security and areas prone to fraud and financial misstatement and on streamlining processes that are part of our client's core business so they can get a higher return on this key investment.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Proven experience as a SOC Analyst or a similar role, with hands-on experience in security monitoring and incident response. Perform triage on security alerts, determining their severity and potential impact, and escalate as necessary.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Analyzing and reporting on communication signals using computers, specialized computer-assisted communications equipment, video display terminals and electronic/magnetic tape recorders Exploiting signals of interest to identify, locate and report worldwide threats Providing tactical and strategic signals intelligence, technical guidance, and information warfare support to surface, subsurface, air and special warfare units.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
10 yrs of hands-on experience in developing and implementing RMF framework and A&A processes, specifically focused on developing SSP packages for achieving ATO for FISMA system. Collaborate with relevant teams to develop and implement action plans for timely remediation of security vulnerabilities and non-compliant areas based on interpreted directives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Hold one of the following certifications within 6 months of commencing work on the Task Order:CCNSecurity CySA+ GICSP GSEC Security+ CE CND SSCP. At ManTech, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement.
$150ExpandApply NowActive JobUpdated Today
hands on security clearance jobs Title: information technology in Washington, Phenix-city, Alabama
FEATURED BLOG POSTS
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.