- UpvoteDownvoteShare Job
- Suggest Revision
XOtech’s client list (past and present) includes the Defense Logistics Agency (DLA), Department of Homeland Security (DHS), U.S. Navy, U.S. Army Forces Command (FORSCOM), U.S. Army Sustainment Command (ASC), U.S. Army Central Command (ARCENT), U.S. Army Pacific Command (USARPAC), U.S. Army Special Operations Command (USASOC), U.S. Army National Guard (ARNG) and the U.S. Army Reserve Command (USARC) U.S. TACOM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Disaster Recovery Manager will play a vital role in ensuring the Continuity of Operations (COOP) and Disaster Recovery (DR) capabilities for OMS. This position requires strong coordination skills, expertise in DR planning, security assessments, and the ability to interface effectively with various stakeholders including CIT Service Areas and the NIH Information Security (InfoSec) team.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Requires B.S. Degree and 4–8 years of prior relevant experience or Masters with 2–6 years of prior relevant experience (in Computer Science, Information Technology, MIS, or related field.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
U.S. Citizen and possess an active Secret Security Clearance. Plan, coordinate, and implement network security measures through manual configuration, installation of patches, or the application of scripts to protect data, software, and hardware.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SIA investigates incidents involving information technology (IT) assets and DIA personnel to the DIA Computer Network Defense Center (DCNDC) and Information Systems Security Managers (ISSM) for situational awareness and tracking purposes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful Cyber Security Engineer applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks to elevate the security posture of the program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of experience and BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics and network forensic experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have a Top-Secret clearance with the ability to obtain/maintain SCI. Must have three (3) years of personnel security administration, proven experience providing administrative security support, excellent computer skills using Microsoft Office, etc., excellent written and oral communication, risk-management and problem-solving skills.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analyze and design cloud-based systems and associated network and computer security measures. ResponsibilitiesAs a Senior IT Architect & Team Lead (Cloud Network & Computer Systems Architect)with MTSI you will assist the Govt IT PM with overseeing the implementation and execution of an air-gapped/private cloud environment, ensuring timely delivery, budget adherence, and alignment with organizational goals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cloud Security Engineer will lead the Network Operations Team working in collaboration with the Information Assurance (IA)/Cybersecurity/Computer Network Defense (CND) Team to perform network operations functions in support of the security tools used in both the AWS Cloud on-premises environment information and the on-premises environment to include the security information and system event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The AVP, Information Security Engineer is responsible for supporting the Bank's security operations, including but not limited to threat identification, intrusion detection, digital forensics, incident response, and the design, implementation, and maintenance of enterprise-wide on-premise and cloud-based security solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applied mathematics ( e.g. probability and statistics, formal modeling, computational social sciences) Computer programming ( e.g. programming languages, math/statistics packages, computer science, machine learning, scientific computing) Visualization ( e.g. GIS/geospatial analysis, telemetry analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAT Level II Baseline Certification (e.g. CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP) The Digital Modernization sector within Leidos is seeking an Identity and Access Management Systems Engineer to be responsible for the upkeep, configuration, and reliable operation of computer systems in support of DISA's Compartmented Enterprise Services Office (CESO) NOC. The IdAM Systems Engineer will to contribute to the deployment and maintenance of an IdAM solution to serve as a comprehensive Identity as a Service (IDaaS) platform for CESO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the common open source and commercial tools used in security event analysis, incident response, computer forensics, malware analysis, or other areas of security operations.
$115,000 - $125,000 a yearFull-timeExpandApply NowActive JobUpdated Today
computer security jobs Company: Lockheed Martin in Bethesda, MD
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.