- UpvoteDownvoteShare Job
- Suggest Revision
Complete self-tests and perform vulnerability/risk assessment analysis to support the Assessment and Authorization (A&A) of information systems. Your Main Objective:Provide support for a program, organization, system, or enclave’s information assurance program as assigned by the Technical Task Order Lead. Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies.
$144,300 - $260,850 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Defense Enclave Services contract will unify the DOD Fourth Estate Defense Agencies and Field Activities’ common use information technology systems, personnel, functions and program elements under the direction of DISA’s Fourth Estate Network Optimization program office.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Company Overview: Athena Technology Group, Inc. (ATG) is a Service-Disabled Veteran Owned Small Business (SDVOSB) focused on Information Technology and Communications consulting, system engineering, integration, deployment, and operation of state-of-the-art command and control and information systems that deliver critical network-centric solution to the warfighter.
$160ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Systems Security Officer (ISSO) provides support for a program, Perform ISSO responsibilities for implementing, and enforcing information systems security policies, standards, and methodologies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop derived requirements for Information Assurance Services (Confidentiality, Integrity, Non-repudiation, and Availability); Basic Information Assurance Mechanisms (e.g., Identification, Authentication, Access Control, Accountability); and Security Mechanism Technology (Passwords, cryptography, discretionary access control, mandatory access control, hashing, key management, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expert knowledge of computer network defense operations (proxy, firewall, IDS/IPS, router/switch, or open-source information collection) Expert knowledge of threat and vulnerability analysis, routing protocols, routing, intrusion detection systems, intrusion protection systems, Domain Name Service, or network traffic analysis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, and/or systems engineering, Network and system administration may account for some, but not all, of the experience.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Defense Information Systems Agency (DISA) Operations and Infrastructure Center (OIC) delivers and defends the Department of Defense Information Network (DoDIN) Area of Operations DISA (DAO DISA), enabling the warfighter and mission partners to conduct continuous global operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications: Experience with client and server-side JavaScript, MVC frameworks, React, and software with languages/frameworks such as Maven and GradleMachine Learning experience or course workUnderstanding of databases (relational or NOSQL)Technical writing skills such as drafting software designs and technical guidanceExperience or understanding of all phases of the Software or Systems Development Life CycleAbility to obtain and maintain a DoD Top Secret/SCI Clearance.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL])Knowledge of parallel and distributed computing concepts Qualifications CLEARANCE: Active Top Secret / SCI.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our work depends on an Information Technology Support Specialist joining our team to provide technical support and troubleshooting services for incoming queries and issues related to computer systems, software, and hardware.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides configuration management for security-relevant information system software, hardware, and firmware. Maintain and enforce IT security policies and implementation guidelines for customer systems in diverse operational environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Establishes and maintains communications with counterparts in the Intelligence Community, the USCYBERCOM service components, other combatant commands, Cyber National Mission Force, Department of Homeland Security/NCSD, CERTS and Information Assurance Centers to collaborate on analysis and identify changes in the environment (This is done only at the direction of USCYBERCOM leadership and in accordance with the guidance of government sponsors within assigned division.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Required Experience/Qualifications Bachelor's degree required in intelligence, information systems, cybersecurity, or related field, and advanced degree/studies preferredor 4+ years experience with cyber training, validation exercises, or working with a cyber protection team (CPT) or Combat Mission Team (CMT), to include planning coordinating, and mission execution.
ExpandApply NowActive JobUpdated Today
systems information jobs in Hanover, MD
FEATURED BLOG POSTS
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.