- UpvoteDownvoteShare Job
- Suggest Revision
The ACA will use DTRA's mobile Computer Network Defense/Exploitation (CND/E) tool kit to perform on-demand network and vulnerability assessments, digital forensics, finger printing, network traffic analysis, full packet capture and session replay, security information, and event management for real-time analysis of correlated data captures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Operate and Design Enterprise solutions for: Logging, Forensics, Security Incident and Event Management (SIEM), and Design Network Access Control (NAC). Design and implement the Enterprise Services portion of the Sensor Grid within the security infrastructure that collects intrusion, incident, and audit data from a collection of sources including but not limited to Content Monitoring products, Content Filtering products, HBSS for servers and hosts with the capability for packet capture, deep inspection, and customized signature capability.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience leading development and maintenance of Insider Threat Network/System/Software information technology and database systems, and or data warehouse implementationsAmentum is proud to be an Equal Opportunity Employer.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
DOD Approved 8570 Information Assurance Technician Level II (IAT-II) Certification, including CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, or SSCP. DOD Approved 8570 Information Assurance Technician Level III (IAT-III) Certification, including CASP+ CE, CCNP Security, CISA, CISSP, GCED, GCIH, and CCSP.
$84,600 - $193,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SAIC is searching for a Senior Linux Systems Engineer located in Charlottesville, VA to support in the modernization of Army insider threat programs performing Army and national security missions to automate and maintain Red Hat Enterprise Linux Systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in the development of RMF Assessment and Authorization (A&A) Security Plans (SP), System Level Continuous Monitoring (SLCM), Ports, Protocols and Services Management (PPSM), Host Based Security Systems (HBSS), Assured Compliance Assessment Solution (ACAS) vulnerability scanning.
$77,000 - $131,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with "pulling data" from PROBE assembling the data in pivot tables and conducting analysis to identify discrepancies. Provide budget execution management support for the Army's IT budget.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of risk management processes, secure configuration management techniques, Government laws and policies, cyber threats and vulnerabilities, encryption algorithms, host/network access control mechanisms, vulnerability information dissemination sources, Payment Card Industry (PCI) data security standards, Personally Identifiable Information (PII) data security standards and incident response and handling practices.
$140,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to research and obtain, evaluate, organize, and maintain information within security and data protocols. The National Security Sector at Leidos is hiring for a Senior Cartographer to join our team supporting a U.S. federal government intelligence agency.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Develop and execute Government approved security policies, plans, and procedures Implement data network security measures Operate and monitor network intrusion detection and forensic systems Conduct IS security incident handling; support Continuity of Operations Plan/Disaster Recovery (COOP/DR) plans andperform certification of IS and networks.
$87,000 - $143,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
ISSO reviews and creates Risk Management Framework (RMF) Certification and Accreditation documentation, standard operating procedures, policies, and security instructions for both networked and stand-alone computer systems and provides oversight and guidance to the development program office for multiple Platform IT systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Description The Information Systems Security Engineer (ISSE) shall provide services for securing, maintaining, operating, and supporting project’s IT systems by providing continuous assurance with full awareness of security, regulatory, and corporate policies, compliance, and implementation of technology in support of security controls.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Customer’s IT Asset Management Section provides support for all Government Enterprise network (GEN) equipment. The Customer’s mission is to operate and defend the GEN, the successful candidate will use their knowledge and experience with asset management, system maintenance and warranty support to provide the below IT Asset Management (ITAM) support.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to identify systemic security issues based on the analysis of data, apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), and interpret the information collected by network tools.
$70,000 - $119,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Chief Information Officer of the Army has charged PdM P2E with, but not limited to, procuring and installing leading-edge technologies including Command, Control, Communications, Computers and Intelligence (C4I) systems; computer and communication networks; network convergence; cloud computing; cyber security compliance; visual displays; product tools; product architecture; modeling; electro-optics; transport; radio frequency devices; control systems; and instrumentation equipment.
Full-timeExpandApply NowActive JobUpdated Today
network security it data jobs Title: engineer windows in Indian Head, MD
FEATURED BLOG POSTS
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.