- UpvoteDownvoteShare Job
- Suggest Revision
Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We’re looking for a BI Analyst to join our team to build complex data models, create data visualizations, conduct robust statistical analysis, and build predictive data science models to help the business make smarter decisions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be considered towards the relevant experience required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DOD and COCOMs∯*∯ In this role, you will provide support with incident handling, triage of events, network analysis, threat detection, trend analysis, metric development, and vulnerability information dissemination.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide research and analysis support related to collection efforts to aid in the development of collection priorities, intelligence reviews, and corresponding Analyst Notebook charts. They conduct all-source analytic production of socio-cultural elements within a region, human terrain, and human geography; Analysis includes religious, linguistic, ethnic, social, tribal, and occupational domains with respect to geography and resources to characterize the dynamics of groups of people worldwide and incorporates sociology, cultural anthropology, demography, psychology, geography, economics, and political science.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Satellite systems to include satellite communication (SATCOMM) equipment, satellite operations, and basic satellite communications principles. Radio Frequency (RF) spectrum analysis theory, including differentiation, spectrum characteristics, and RF agility.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Analyst in the NSAD Operations and Programs Analysis Group. If so, we want to talk to you about joining the National Security Analysis Department (NSAD) Operations and Programs Analysis Group at Applied Physics Laboratory (APL.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At Booz Allen, you can apply your vulnerability analysis, network mapping, exploitation, defensive, and IT logging process experience to execute offensive cyber operations that inform our nation's most critical security missions.
$93,300 - $212,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Perform facility baselining and monitoring as part of a broader risk-based oversight model; to include research/analysis of business operations and key management personnel. In this role, you will be responsible for identifying risk to cleared facilities and supporting personnel in mitigating security threats, through coordination with industrial security representatives, continuous monitoring, and execution of research and analysis on cleared companies and key management personnel.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead PAM Analyst Operations is expected to conduct the following activities: Design and execute PAM strategies and policies. a {line-height: 120.0%;} Lead Analyst Privileged Access Management Operations Who We AreAt WSP, we are driven by inspiring future-ready pioneers to innovate.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, or open-source information collection) Responsibilities may include collecting and analyzing intelligence to correlate adversary tactics, techniques, and procedures, investigating computer and information security incidents, conducting computer forensic network and host analysis, intrusion and threat hunting support, performing penetration tests to evaluate system security, maintaining proficiency in operation tools, creating countermeasures, and identifying trends in adversary behaviors and vulnerabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
$71,500 - $150,200 a yearFull-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Analyst is responsible for the analysis and documentation of security incidents, participate in the litigation hold processes, ensuring that security events are properly enumerated and resolved and accounted for in the ITSM tools.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Operations include the following areas: Budgeting, Cost Accounting, Clinical Resource Management, Financial Business Planning, and Managed Care Contracting. Extensive multi-specialization working knowledge of the PDS System and how it relates to at least three of the following specialty areas: Clinical Analysis, Business Development, Budget Analysis, Strategic Financial Planning & Subsidiary Ventures, Cost Accounting, or Managed Care.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Prepare synthesized product for customers by researching, analyzing and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with USG missions of Signals Intelligence, Information Assurance and Computer Network Operations.
Full-timeExpandApply NowActive JobUpdated Today
operations analyst analysis jobs in Annapolis Junction, MD
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.