- UpvoteDownvoteShare Job
- Suggest Revision
Job Description Overview The Network Administrator will be responsible for providing cybersecurity analysis, information technology support, and applying DoD security controls to operating systems and applications.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The contractor shall update and maintain Cyber Security system patching, vulnerability assessments using ACAS vulnerability scanner, Defense Information Systems Agency (DISA) STIGS and Security Content Automation Protocol (SCAP) in accordance and collaboration with the Information System Security Manager (ISSM/ISSO) Officer in accordance with the RMF/JSIG, Rev 4, and as amended.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
RMC is hiring an Information Security Analyst for the role of Information Security Systems Officer (ISSO) to support our NAVAIR customer in Patuxent River, MD. The selected applicant will perform a variety of Information Assurance and Risk Management Framework (RMF) activities, including but not limited to: Serving as an ISSO for a designated NAVAIR program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Supports program requirements, program schedules and performs other related tasks in support of FMS pre-case, case execution, reconciliation and case closure activities, in accordance with the Arms Export Control Act, the Security Assistance Management Manual (SAMM) and the International Traffic in Arms Regulation (ITAR) as well as applicable DoD Acquisition policy guidance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Experience: Cisco CCNA (or higher) CISSP PMP ISR experience Personnel Clearance Level: Candidate must possess or have the ability to obtain an active, DoD issued TS/SCI security clearance.
$130,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cert requirements: 8570 IAT II certification (CompTIA Security+) and Mid/Senior may require CCNA, CCNP or other certs. Troubleshooting and diagnosing hardware/software problems, preparing technical proposals, performing upgrades, routine network startup/shutdown procedures, and routine O&M activities.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Network engineering, VOIP, Firewall, CCNA, Cisco routers, Cisco switches, Router, WAN, BGP, Troubleshooting, Switches. Knowledgeable engineer in the field of Ethernet and IP data engineering with 4 plus years’ experience as a Network Technician.
TemporaryExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Clearance Required:Top Secret SCI Education Required:BA/BS or HS/GED and Equivalent Work Experience US Citizenship:Required SummaryThe MIL Corporation is seeking a Cyber Security Vulnerability Researcher & Forensic Analyst, Advanced (Security Engineering, Senior Associate) to perform as a senior member of the Naval Aviation Red Team leading and executing adversarial threat representation against USN Aviation Weapons and Support Systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Enterprise Mission Assurance Support Service (eMASS), Security Technical Implementation Guides (STIGs), Security Content Automation Protocol (SCAP), Assured Compliance Assessment Solution (ACAS), Ports, Protocols and Services Matrix, Vulnerability Remediation Asset Manager (VRAM), and Host Based Security System (HBSS.
$137,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
AMEWAS, Inc. is seeking a highly motivated and talented Security Specialist (Contractor Program Security Officer-CPSO-Combined Security Officer-CSO)-Journeyman to support Advanced Aircraft Research, Development, Test & Evaluation.
$130,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of computer networking concepts and protocols, and network security methodologies. The MIL Corporation is seeking a Cyber Security Vulnerability Researcher & Forensic Analyst, Advanced (Security Engineering, Senior Associate ) to perform as a senior member of the Naval Aviation Red Team leading and executing adversarial threat representation against USN Aviation Weapons and Support Systems.
$210,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Works independently in the performance of Integrated Logistics Support (ILS) analysis for aircraft, airborne weapons, and/or support equipment programs to facilitate Security Assistance and Foreign Military Sales (FMS) transportation.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
LINUX System Administrator, ESTEL TEAM, Available Immediately Location: St Inigoes, MD - Webster Outlying Field (WOLF)REID Infrastructure Do you hold an active US government TOP SECRET or SECRET/SSBI upgradable to TS level security clearance and a Security+certification.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Active Secret with the ability to obtain and maintain a TS/SCI level security clearancePreferred Qualifications:Experience in at least one of the following areas: Software Architecture, DevOps/DevSecOps, Aegis Weapon System Experience leading small technical teams to deliver positive impact to a sponsor.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as an Information Systems Security Officer (ISSO) for information systems in support of a Program Management Activity (PMA). Under the direction of Information Systems Security Manager(s) (ISSMs), candidate will assist with supporting the performance of assessments of systems and networks within the networking environment or enclave and identifies where those systems/networks deviate from acceptable configurations, enclave policy, or local policy.
Full-timeExpandApply NowActive JobUpdated Today
network security jobs Title: network administrator Company: Kforce Inc in Lexington Park, MD
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?