- UpvoteDownvoteShare Job
- Suggest Revision
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and general familiarity with the following: Knowledge of AWS Services and storage mechanisms, performing system administration within the AWS Cloud environment, Windows System Administration, BigFix installation and reporting, maintaining system security plans, experience with Jira and Confluence, experience mitigating information assurance vulnerability alerts (IAVA, Patch management IAVA.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A Bachelor's Degree in Computer Science, Information Systems Management, or Information Assurance/Cyber Security may be substituted for four years of experience. Working knowledge of several of the following technologies: Microsoft Windows, Linux, Solaris, Cisco IOS, Active Directory, DNS, VMWare, Disk SAN, security assessment and penetration testing tools (examples: WASSP/SECSCN, Nessus, Retina, Metasploit, BackTrack, CIS-CAT), Intrusion Detection/Prevention systems (IDS/IPS), server and network hardware and media (blade-servers, fiber¬ channel, and network cabling.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Employing basic information assurance mechanisms (e.g., identification, authentication, access control, and accountability) and security mechanism technology such as passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance and/or systems engineering.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform and/or review technical security assessments of computing environments to identify points of vulnerability, non- compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
$220,900 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system, program, or enclave. Supports security authorization activities in compliance with National Institute of Standards and Technology Risk Management Framework (NIST RMF.
$154,211 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelors degree in Computer Science, Information Assurance, Information Security System Engineering, or related discipline from an accredited college or university is required. Intelink Services provide interagency information sharing, content discovery, and collaboration capabilities on the IC system domains to the IC and its partners in Defense, Homeland Security, Foreign Affairs, and Law Enforcement.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with a broad cross-section of staff members within APL to include Information Assurance, Security, Program Managers, Contracts Managers, and Cost Account Managers. Have experience utilizing SIMS or other security management tools.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Information Assurance: Securing Cloud Based and Distributed applications through industry standard techniques such as Firewalls, PKI Certificate and Server Authentication with experience in Corporate authentication service(s) Experience with Information Technology: Object Oriented Design and Programming, Java, Eclipse or similar development environment, Maven, RESTful web services.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Your Main Objective:Provide support for a program, organization, system, or enclave’s information assurance program as assigned by the Technical Task Order Lead. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
$260,850 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requisition Number: 18486 Required Travel: 0 - 10% Employment Type: Full Time/Salaried/Exempt Hours Per Week: 40.00 Security Clearance: TS/SCI with Poly Level of Experience: Mid Job DescriptionMission Technologies a division of HII - Cyber Electronic Warfare and Space (CEWS) provides full-spectrum cyber, EW and space capabilities that address today’s rapidly changing, multi-domain global security threats, and anticipate emerging threats.
Full-timeExpandApply NowActive JobUpdated Today
security assurance jobs in Hanover, MD
FEATURED BLOG POSTS
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
Hiring Taking Too Long?
We all know one of the biggest downfalls of a successful recruiting and hiring process is the amount of time it takes to hire someone. The time it takes to hire is sometimes completely out of line with applicant's expectations, creating a huge gap between candidates and businesses. Meanwhile, most recruiters and hiring managers don't even notice that they're taking too long. They have been fighting the symptoms of a too-long-hiring process without addressing the problem at the root. Here, we will expose some of those symptoms and offer solutions to help shorten your hiring process.
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.