- UpvoteDownvoteShare Job
- Suggest Revision
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Transform technology into opportunity as an Chief Information Security Officer with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. Analyzes the information systems to ensure that appropriate security functions have been included in the systems design and architecture.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have 3 or more years of experience applying signal processing, pattern recognition, machine learning, deep learning, or related techniques with respect to information extraction from electromagnetic systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experimental experience with two or more of the following specialities: atomic physics systems, diffraction limited optical systems, lasers (from UV to IR), quantum information science, quantum sensors, atomic clocks, and vacuum systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with big data platforms, black box testing, cloud computing, disassembly, or global telecommunications system architectures and protocols, protocol analysis, ICS/SCADA design and systems, software debugging, streaming analytics, vulnerability management, or mitigation.
$81,800 - $186,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Team ADNET brings over 30 years of experience to information systems and professional services for the federal government. ADNET Systems, Inc. is working with Goddard Space Flight Center to fulfill NASA's vision for space exploration, and working with the Science and Exploration Directorate to fulfill its many missions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position will support the DISA GSM-O II Task Number 07 (TN07) Joint Force Headquarters DODIN. GSM-O II provides network operations and cyber defense support to the Defense Information Systems Agency (DISA) in support of the DoD and COCOMs∯*∯ The selected candidate shall execute in real time, in accordance with mission requirements, ensure "Authorized mission partners" have visibility and usability of proper operational capabilities.
$122,200 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Within our Oceaneering Technologies (OTECH) group, you will be responsible for performing diverse activities associated with the development and implementation of complex power and control systems for unique underwater robotic and electromechanical systems, helping solve our customers' toughest challenges - typically for US Navy and other US Government Department of Defense customers.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Going beyond traditional learning management systems, we use tech, people, and data to help top universities and enterprise organizations transform in the digital era—and eliminate the back row in higher ed.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
4+ years’ experience installing and/or servicing intrusion, Fire alarm, Access Control, and CCTV security systems with a basic understanding of electronics, wiring, local and national codes. As a leading systems integrator and alarm monitoring company, we deliver the Securitas Technology Difference, serving countless long-term clients with solutions and services that protect their people, customers, and assets.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have Matlab experience in modeling, data analysis, and development of algorithms for complex systems. As a member of our team, you will use fundamentals of digital signal processing and RF communication techniques to prototype, execute performance modeling, and produce analysis products for maritime systems with an emphasis on detection, classification, and tracking.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position will pursue new opportunities in the areas of intelligence analysis, training, and mission support (all source, SIGINT, OSINT, HUMINT, Counterintelligence, GEOSPATIAL, Virtual Reality Training); targeting and mission planning; systems engineering and integration of C5ISR systems; and data ingest and integration.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Base-2 Solutions is seeking to hire an ISSE. The Information Systems Security Engineer (ISSE) shall perform or review technical security assessments of computing environments to identify points of vulnerability and non-compliance with established Information Assurance (IA) standards and regulations and recommend mitigation strategies.
ExpandApply NowActive JobUpdated 3 days ago
information systems jobs Title: data analyst Company: Intuitive in Laurel, MD
FEATURED BLOG POSTS
How to Write an Address Correctly: Explained with Examples
It's hard to imagine a scenario where a text or phone call just won't do these days. With communication at our fingertips, you may think learning how to write an address is a superfluous skill. But it's a skill that will come in handy when you need to fill out healthcare forms, ship a package, order food delivery, or even apply for new jobs.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.