- UpvoteDownvoteShare Job
- Suggest Revision
XOtech’s client list (past and present) includes the Defense Logistics Agency (DLA), Department of Homeland Security (DHS), U.S. Navy, U.S. Army Forces Command (FORSCOM), U.S. Army Sustainment Command (ASC), U.S. Army Central Command (ARCENT), U.S. Army Pacific Command (USARPAC), U.S. Army Special Operations Command (USASOC), U.S. Army National Guard (ARNG) and the U.S. Army Reserve Command (USARC) U.S. TACOM.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful Cyber Security Engineer applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks to elevate the security posture of the program.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possess above average computer skills and must hold all necessary and required licenses, permits and certifications required by the of assignment to perform security officer duties.
$25 - $26 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Engineer may be involved with commercial, custom and/or government computer product vendors in the design, evaluation, and architecture of state-of-the-art secure GOTS/COTS applications, operating systems, networks, databases, and custom built technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist network and systems security personnel in IA incident response, including close coordination with the Theater IAM for all IA related tasks. Requires B.S. Degree and 4–8 years of prior relevant experience or Masters with 2–6 years of prior relevant experience (in Computer Science, Information Technology, MIS, or related field.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience performing DoD military active duty or defense contractor work with designated End Point security solutions, HBSS capabilities and HBSS/McAfee ePolicy Orchestrator (ePO) operationsPreferred Qualifications: Experience with Computer Network Defense (CND) within a Computer Incident Response organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have ONE of the following certifications: CASP+ CE; CCNA Cyber Ops; CCNSecurity; CCNP Security; CEH; CFR; CHFI; CISA; CISSP (or Associate); CySA+; GCED; GCFA; GCIH; SCYBER. Peraton is currently seeking an experienced Cloud Monitoring Analyst Team Lead to support the CIRT Team in supporting the Department of State’s (DoS) Computer Incident Response Team leveraging deep knowledge of computer forensic techniques, malware analysis and monitoring / incident response to work with key stake holders in an effort to develop methodologies and processes to support the Department’s migration and integration of cloud-based services.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Disaster Recovery Manager will play a vital role in ensuring the Continuity of Operations (COOP) and Disaster Recovery (DR) capabilities for OMS. This position requires strong coordination skills, expertise in DR planning, security assessments, and the ability to interface effectively with various stakeholders including CIT Service Areas and the NIH Information Security (InfoSec) team.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A relevant Bachelors degree in IT, Computer Science or engineering with 5 years of IT cybersecurity experience including direct support for the US Government and 4 years acting as an ISSO, assessor, or compliance analyst.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelors Degree in IT Management, Computer Science, or related STEM discipline from an accredited institution recognized by the US Department of Education for Higher Education Administration (CHEA.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Global Dimensions is a HUBZone, service disabled, veteran-owned small business based in Fredericksburg, VA. We are a dynamic, expanding company with exciting opportunities in language/culture, training/education/instruction, IT, cyber security, and intelligence (analysts, CI, HUMINT, SIGINT, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Lead Cloud Security Engineer will lead the Network Operations Team working in collaboration with the Information Assurance (IA)/Cybersecurity/Computer Network Defense (CND) Team to perform network operations functions in support of the security tools used in both the AWS Cloud on-premises environment information and the on-premises environment to include the security information and system event management (SIEM) system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SIA investigates incidents involving information technology (IT) assets and DIA personnel to the DIA Computer Network Defense Center (DCNDC) and Information Systems Security Managers (ISSM) for situational awareness and tracking purposes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must have a Top-Secret clearance with the ability to obtain/maintain SCI. Must have three (3) years of personnel security administration, proven experience providing administrative security support, excellent computer skills using Microsoft Office, etc., excellent written and oral communication, risk-management and problem-solving skills.
RemoteExpandApply NowActive JobUpdated Today
computer security jobs Company: Lockheed Martin in Chevy Chase, MD
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.