- UpvoteDownvoteShare Job
- Suggest Revision
Advise the Authorizing Official/Authorizing Official Designated Representative and Security Control Assessor (SCA) of any changes affecting the enclave's CS risk level and security posture.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAT II (Security+, CySA+, CCNA Security, GICSP, GSEC, SSCP) Investigates, analyzes, and responds to cyber incidents within a network environment or enclave. Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware, firmware and software for possible impact on system security, and the investigation and resolution of security incidents such as intrusion, frauds, attacks or leaks.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Security + Certification Active Top-Secret Clearance, ability to obtain and maintain a TS/SCI Experience with network concepts, Microsoft Windows and Linux operating systems, client-server architectures, virtualization technologies, and basic troubleshooting concepts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with MS Active Directory, Splunk, ACAS/Nessus, McAfee, Windows, Linux, AWS Security, etc. Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Plan, and Security Assessment Plan, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in network and system design to facilitate implementation of appropriate systems security policies. Responsible for software assurance, penetration testing with a range of automated tools, security patch management, secure cloud and hybrid engineering, and CDSRecommend, install, configure, operate, and maintain Government-approved IT security tools, RSA Archer and applications to support overall information assurance activities necessary to protect systems in client security environments.
$140,000 - $155,000 a yearFull-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
On our team, you'll be part of a team as they troubleshoot and analyze complex challenges for customers using your knowledge of network and security devices and applications. Using your expertise focused on Splunk along with other cyber security tools, like HBSS/Trellix EDR, Nessus, FirePower, FireEye, or Palo Alto FW, you'll assess security threats and implement infrastructure controls.
$96,600 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ability to accurately manage complex workstreams, comprehend the application of the RMF, and understand the application of security controls across the interface, application, operating system, network, and database layers of modern information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide training on the Diplomatic Security Identity Assurance System (DSIAS) to students attending the Basic RSO, RSO In Service, Assistant Regional Security Officer-Investigations, Foreign Service National Investigator, and Foreign Service National Investigator In Service training classes at the Diplomatic Security Training Center.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum six (6) years of experience configuring and administering firewall technologies such as carrier class Checkpoint Firewalls, Palo Alto and Network Security Policy Management. Preferred Education: Bachelor's degree in an IT-related field Preferred Certifications: CCSE, CISSP, CISM, Security, CASP Must have active Top Secret security clearance Requirements: Eight (8) years of experience in Information Technology, Cybersecurity, or a related field.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information System Security Officer (ISSO), in coordination with the Program Security Officer (PSO) and the Information System Security Managers (ISSM), shall provide comprehensive Information Security (INFOSEC) assistance and oversite daily.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Info Security Identity Access Portfolio needs X Cyber Security Solutions Engineer/Architect supporting its Innovation, Architecture & Governance (IAG) at USPS Gatehouse Center. Designs, develops, implements and/or integrates IA and security systems and system components including those for networking, computing, and enclave environments to include those with multiple enclaves and with differing data protection/classification requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position Overview QinetiQ U.S. seeks a junior Strategic Communications and Public Affairs Analyst responsible for managing an integrated marketing communications and public affairs portfolio on behalf of a federal law enforcement organization within the U.S. Department of Homeland Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Positions will be available in the following skill area: Cloud Network Systems Administrator Network and Computer Systems Administrator Computer Hardware Engineer Computer Network Architect Computer Network Support Computer Systems Analyst Information Security Analyst Qualifications QUALIFICATIONS: Minimum education, experience, and certification requirements will vary based on labor category, role, and level, and most comply with the Navy's Cybersecurity Workforce (CSWF) framework.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In addition, the candidate will be responsible for ISN/CTR’s civil nuclear security programming efforts, which focus currently on the Asia/Pacific region, Africa, Eastern Europe, Central Asia, Latin America, and the Middle East. CTR’s programmatic efforts evolve in response to the international security environment and seek to reinforce U.S. national security objectives in a dynamic environment.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position Description: Research, design and implement security solutions for network infrastructure. Interface with customer IT leadership and internal teams to develop network, systems, and security solutions.
ExpandApply NowActive JobUpdated Today
network security jobs Title: network specialist Company: Optello in Washington, DC
FEATURED BLOG POSTS
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.