- UpvoteDownvoteShare Job
- Suggest Revision
If you're a technical changemaker with a passion for Cyber Operations, Cloud and Data Analytics, or Engineering, we're looking for you! You will utilize advanced analytical algorithms, programming (in at least one high level language (e.g. Python), statistical analysis, variability, sampling error, inference, hypothesis testing, EDA, application of linear models), data management (e.g. data cleaning and transformation), data mining, data modeling and assessment, artificial intelligence, and/or software engineering.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop/Maintain and Deliver assigned courses within the IT Cyber Security Security Control Learning Series Develop and review educational/training materials and job aids which support the Security Control Program (IT SCP) Provide functional and technical support for the GRC platform.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes performing real-time cyber threat intelligence analysis, correlating actionable security events, performing network traffic analysis using raw packet data, and participating in the coordination of resources during the incident response process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2 years of experience as an instructor in threat analysis or 3 years of experience in a leadership position, with 4 or more direct reports, in an organization such as a Security Operations Center, a Cyber Emergency Response Team, a Cyber Protection Team/Blue Team or a Red Team/Cyber Mission Team.
$179,000 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must be familiar with United States Signals Intelligence Directive (USSID) Experience Experience with working on a C2 application through effective integration of air, space, and Cyber capabilitiesMust have a current TOP SECRET SCI security clearance with a current Polygraph.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implements security designs in hardware, software, data, and procedures. Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment, environmental remediation and the largest family of unmanned underwater vehicles in every class.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in Computer Science, Software Engineering, Mathematics, Applied Mathematics, Machine Learning, Data Science, Computer Information Systems, Engineering, or related studies may be considered.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our client's specialties include implementing real-time solutions and analytics through the use of interactive applications and the integration of industry-standard software stacks for both enterprise data intelligence and cyber security protection against network threats and exploits.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Establishes and maintains communications with counterparts in the Intelligence Community, the USCYBERCOM service components, other combatant commands, Cyber National Mission Force, Department of Homeland Security/NCSD, CERTS and Information Assurance Centers to collaborate on analysis and identify changes in the environment (This is done only at the direction of USCYBERCOM leadership and in accordance with the guidance of government sponsors within assigned division.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BlueHalo is a national source for classified Cyber/SIGINT missions and a leading provider of blockchain/crypto analytics and platform cyber resiliency, specializing in offensive and defensive cyber and SIGINT warfare technologies.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Primary Responsibilities: - Counterterrorism & Force Protection - Pedestrian and vehicular access control - Response and mitigation of security, medical, and fire emergencies - Critical incident management - Enforcement of laws and regulations relative to the protection of NSA assets - Vehicle, facility, and material security inspections - Firearms training and range management - Patrol of NSA property.
$128,956 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We’re looking for a Splunk Engineer who can create solutions for our customers that will stand up to even the most advanced cyber threats. DoD8570 IAT II Compliance Certification, including Security+, CCNA Security, or GSEC.
$193,000 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 5 years of relevant experience in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Education : Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
$198,300 a yearFull-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a CACI-SOAS Senior SI/Cyber Analyst, you will serve as a key member of a threat analyses and strategic planning team embedded with the 389th Military Intelligence Battalion and in direct support of US Army Special Operations Command (USASOC), the Theater Special Operations Commands and other Strategic Partners across the Special Operations Forces Emerging Threat, Operations and Planning Support (SOFETOPS) enterprise.
$180,200 a yearFull-timeExpandApply NowActive JobUpdated Today
data cyber security jobs Title: senior software engineer in Crownsville, MD
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?