- UpvoteDownvoteShare Job
- Suggest Revision
Peraton Overview Peraton is a next-generation national security company that drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. Peraton operates at the critical nexus between traditional and nontraditional threats across all domains: land, sea, space, air, and cyberspace.
ExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They must have a familiarity with the Department of Defense Information Assurance Certification, Enterprise Mission Assurance Support Service (eMASS), Certificates of Networthiness (CoN), the Risk Management Framework (RMF) and the Federal Information Security Management Act (FISMA) in order to facilitate accreditation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with the DREN ISSM, initiate protective or corrective measures when a cybersecurity incident or vulnerability is discovered and ensure process is in place for authorized users to report all cybersecurity-related events and potential threats and vulnerabilities to the ISSO.
ExpandApply NowActive JobUpdated 6+ months ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience designing of secured systems architecture deployed to DoD on-premise and Cloud secured architectures, hands-on securing Development/Test/Deployment environments, hands-on System Security Engineering, and assisting Information Systems Security Manager/Officer (ISSM/ISSO) Services throughout the system Assessment and Authorization processes.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Preferred experience: Ansible, Elastic (ELK) stack, Cisco ASA, Palo Alto Firewall/IPS/Panorama, Kafka, virtual machines, and containers. Hands–on experience with cyber security tools employed within DoD architectures, such as: ACAS Security Center and Nessus Scanner, varied Firewall and IDS/IPS technologies, Endpoint Security products, Security Incident and Event Management, and PKI.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking an Information Systems Security Officer - Journeyman tosupport Project Manager, Intelligence Systems Analytics (PM IS A) Cybersecurity Support Services by supporting cybersecurity systems engineering, assessment and authorization, field service engineer, and other management support services necessary to accomplish the missions and goals.
ExpandUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Serve as the liaison between the contract and the government for all Information Security endeavors to include Risk Management Framework Assessment and Authorization tasks, Continuous Monitoring, and government IT connection and application issues.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience with providing expert support, analysis and research in Intelligence Community (IC) and DoD Risk Management Framework (RMF) requirements and processes to support the IC, DoD and Army RMF assessment and authorization processes Includes experience as a technical SME, Information System Security Officer (ISSO) or Information Security System Engineer (ISSE) on Army Program Of Record (POR)/Quick Reaction Capability (QRC) products.
$200,000ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This position is located at Aberdeen Proving Grounds, MD. If you are a dedicated and experienced Cyber Security Engineer who excels in eMASS, STIG, ACAS, and SCA–A assessments, we encourage you to apply for this rewarding opportunity.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain Risk Management Framework (RMF) Enterprise Mission Assurance Support Service (eMASS) Assess Only packages in support of tactical PIT devices through coordination with vendor on Security Technical Implementation Guide (STIG) development and Assured Compliance Assessment Solution (ACAS) scans.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Gather and analyze a system's cybersecurity posture with DoD and Industry cybersecurity tools such as Tenable Assure Compliance Assessment Solution (ACAS) Nessus scanner, DoD Security Technical Implementation Guidelines (STIGs), Security Content Automation Protocol (SCAP) Compliance Checker (SCC), Evaluate-STIG, varied Firewall and IDS/IPS technologies, Endpoint Security products, Security Incident and Event Management, and PKI.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with authorization actions concerning software development and testing, and the interpretation of patterns of non-compliance to determine their impact on levels of risk or overall effectiveness of the enclave's cybersecurity program.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience evaluating risk analysis in the decision-making process, and evaluating proposals to determine if proposed security solutions effectively address enclave requirements, as detailed in solicitation documents.
Part-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CACI is actively seeking a highly skilled and experienced Mid to Senior Cyber Security Engineer to join our Cybersecurity Team. The ideal candidate will possess a deep understanding of cybersecurity principles and specialized expertise in eMASS (Enterprise Mission Assurance Support Service), STIG (Security Technical Implementation Guide), ACAS (Assured Compliance Assessment Solution), and the ability to conduct Security Control Assessment - Authorization (SCA) assessments.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Three (3)+ years of experience with the DoD Risk Management Framework (RMF) process and Enterprise Mission Assurance Support Services (eMASS) The program implements the modernized system in an IL5 GovCloud environment using a DevSecOps CI/CD pipeline, and incorporates additional technologies such as AI/ML.
Full-timeExpandApply NowActive JobUpdated 22 days ago
drug screening and alcohol jobs in Aberdeen, MD
FEATURED BLOG POSTS
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.