- UpvoteDownvoteShare Job
- Suggest Revision
Ensuring continued security of the network and proactive enhancement of cybersecurity to meet evolving and emerging threats, to include compliance with DoD Risk Management Framework (RMF) and continuous monitoring requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support the maintaining of CG User Account access and performing random account audits on Information Assurance tools to include but not limited to Information Assurance Compliance System (IACS), Assured Compliance Assessment Solution (ACAS), Homeland Secure Data Network (HSDN), Continuous Monitoring Risk Scoring (CMRS), Cyber Operational Attribute Management System (COAMS) and Enterprise Mission Assurance Support Services (eMASS.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Tracks succession schedules in support of the DOC Continuity of Operations Program Communicate via classified systems such as STE/VIPR phones, Secure SATELITE Phones, Secure Faxes and Secure Internet Protocol Router Network (SIPRNet) Maintains EOC calendar Receives, reviews, and responds for further action emergency notifications and information about events impacting or affecting DOC operations and programs around the world in accordance with the EOC SOP, plans, policies, and procedures.
$33.98 - $37.72 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Overview/ Job Responsibilities Sev1Tech is looking for a Network Operations and Security Center (NOSC) Tier 1 Specialist to play an integral role on a large enterprise IT government program providing network, cybersecurity, cloud operations, and engineering support services with a significant focus to provide IT security and public safety.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As an NMT Engineer, you will work with a team of engineers who provided provide support for the overall design, implementation, testing and maintenance of the Network Monitoring Tools, are responsible for network fault management, performance and configuration management including alerting, reporting functions for the entire DHS HSEN network infrastructure, and manage user accounts, provide reports, and assist with various projects as defined by the program.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
APSS - Avaya Aura Application Server 5300 - Avaya, CCNA - Cisco, CompTIA Network Security Professional - CompTIA - CompTIA - Security+ Our work depends on LEAD VOICE ENGINEER joining our team supporting our DISA Enterprise Transport Management - Next-Gen (DISA ETM - NG) program at the Pentagon in Arlington, VA.
$110,500 - $149,500 a yearFull-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with other client IT service areas, such as Cloud Services, Identify and Access Management, Network Services, and the Information Security Program, as well as with Office of the Chief Information Officer (OCIO) divisions, to develop new solutions and maintain compliance with the client's policies and procedures.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Program Overview: The CDM Program is managed within the DHS Cybersecurity and Infrastructure Security Agency, CISA/Office of Cybersecurity and Communications (CS&C)/Network Security Deployment (NSD) Division, responsible for enhancing the security, resilience, and reliability of the Nation's cyber and communications infrastructure.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
We specialize in program and project management, capital planning and IT investment portfolio management, infrastructure support and application development deployment to include IT operations and maintenance.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contract will support business services in support of Code 80 and other organizations associated with or sponsoring the NSWCCD. The business services include Program Management and Planning, Finance, Logistics, Security, Space Planning, Safety, Administrative Services, Technical Editing, Records Management, and Computer Engineering and IT support.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with assessment of a comprehensive and broad set of security technologies and processes, data security, cryptography, key management, identity, and access management, cloud API integration, network security, logging and monitoring within SaaS, IaaS, PaaS, and other cloud environments.
Full-timeExpandApply NowActive JobUpdated Today
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.