- UpvoteDownvoteShare Job
- Suggest Revision
XOtech’s client list (past and present) includes the Defense Logistics Agency (DLA), Department of Homeland Security (DHS), U.S. Navy, U.S. Army Forces Command (FORSCOM), U.S. Army Sustainment Command (ASC), U.S. Army Central Command (ARCENT), U.S. Army Pacific Command (USARPAC), U.S. Army Special Operations Command (USASOC), U.S. Army National Guard (ARNG) and the U.S. Army Reserve Command (USARC) U.S. TACOM.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful Cyber Security Engineer applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks to elevate the security posture of the program.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possess above average computer skills and must hold all necessary and required licenses, permits and certifications required by the of assignment to perform security officer duties.
$25 - $26 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer may be involved with commercial, custom and/or government computer product vendors in the design, evaluation, and architecture of state-of-the-art secure GOTS/COTS applications, operating systems, networks, databases, and custom built technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing DoD military active duty or defense contractor work with designated End Point security solutions, HBSS capabilities and HBSS/McAfee ePolicy Orchestrator (ePO) operationsPreferred Qualifications: Experience with Computer Network Defense (CND) within a Computer Incident Response organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have ONE of the following certifications: CASP+ CE; CCNA Cyber Ops; CCNSecurity; CCNP Security; CEH; CFR; CHFI; CISA; CISSP (or Associate); CySA+; GCED; GCFA; GCIH; SCYBER. Peraton is currently seeking an experienced Cloud Monitoring Analyst Team Lead to support the CIRT Team in supporting the Department of State’s (DoS) Computer Incident Response Team leveraging deep knowledge of computer forensic techniques, malware analysis and monitoring / incident response to work with key stake holders in an effort to develop methodologies and processes to support the Department’s migration and integration of cloud-based services.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A relevant Bachelors degree in IT, Computer Science or engineering with 5 years of IT cybersecurity experience including direct support for the US Government and 4 years acting as an ISSO, assessor, or compliance analyst.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelors Degree in IT Management, Computer Science, or related STEM discipline from an accredited institution recognized by the US Department of Education for Higher Education Administration (CHEA.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Disaster Recovery Manager will play a vital role in ensuring the Continuity of Operations (COOP) and Disaster Recovery (DR) capabilities for OMS. This position requires strong coordination skills, expertise in DR planning, security assessments, and the ability to interface effectively with various stakeholders including CIT Service Areas and the NIH Information Security (InfoSec) team.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SIA investigates incidents involving information technology (IT) assets and DIA personnel to the DIA Computer Network Defense Center (DCNDC) and Information Systems Security Managers (ISSM) for situational awareness and tracking purposes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cloud Security Engineer will lead the Network Operations Team working in collaboration with the Information Assurance (IA)/Cybersecurity/Computer Network Defense (CND) Team to perform network operations functions in support of the security tools used in both the AWS Cloud on-premises environment information and the on-premises environment to include the security information and system event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Global Dimensions is a HUBZone, service disabled, veteran-owned small business based in Fredericksburg, VA. We are a dynamic, expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must have a Top-Secret clearance with the ability to obtain/maintain SCI. Must have three (3) years of personnel security administration, proven experience providing administrative security support, excellent computer skills using Microsoft Office, etc., excellent written and oral communication, risk-management and problem-solving skills.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Requires B.S. Degree and 4–8 years of prior relevant experience or Masters with 2–6 years of prior relevant experience (in Computer Science, Information Technology, MIS, or related field.
Full-timeExpandApply NowActive JobUpdated 2 days ago
computer security jobs Company: Lockheed Martin in Washington, DC
FEATURED BLOG POSTS
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.