- UpvoteDownvoteShare Job
- Suggest Revision
JCS Solutions has a need for a Network Engineer SME to join our growing Defense Enclave Services (DES) team at Ft. Meade, MD. The DES program is a highly demanding mission and requires expert technical and professional management to support DISA's enterprise Information Technology (IT) services.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Performs as a consultant in highly specialized, leading edge information technologies and methodologies; Provides highly technical and specialized guidance concerning automated solutions to complex information processing problems; Performs elaborate analyses and studies; Prepares reports and gives presentations.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Integrate Military Information Support Operations (MISO) functions and tasks into all facets of Combatant Command (CCMD) / Unified Command level planning, and ensure the command group and staff consider PSYOP/MISO in the decision-making process.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Systems Security Officer Skill Level 3 (ISSO) - Senior Description : Provide support for a program, organization, system or enclave's information assurance program. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate operational Cybersecurity posture for a system, program, or enclave.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
STAHL Companies is seeking a motivated, career and customer-oriented Deputy Program Manager (DPM) to provide unparalleled support to our customer and to begin an exciting and rewarding career in support of the Defense Information Systems Agency (DISA) Unified Cyber Situational Awareness (UCSA) program.
ExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Analyst ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure the system and network enterprise environments and uses technical knowledge and analytical skill to determine the optimum mix of technology, policy, procedures and education to implement effective information security programs and strategies.
$203,600 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SAIC’s National Intelligence Community (NIC) Business Unit, USG Mission and Information Technology Division, provides solutions and services supporting digital modernization programs in areas such as systems engineering, multi-cloud computing, cybersecurity, data science and analytics, artificial intelligence and machine learning, quantum computing, application development, SecDevOps, cloud network operations, and secure communications.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Windward Consulting is at the forefront of Service-Centric IT. With strategic consulting, unparalleled technical expertise and our proven Windward Service-Centric IT RoadMap, we help our clients align the core competencies of process, organization, information and technology to run the most sensitive and mission-critical IT environments in the world.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The badge of CompTIA Security+ CE is your armor, proving your dedication to safeguarding the realms of technology. You'll be the maestro behind installing, troubleshooting, and enhancing operating system software, sculpting network components, and adding layers of reliability and performance.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience and training on the verification and enforcement of Information Assurance Vulnerability Management (IAVM) identification and remediation. Assist with preparation for Defense Information Systems Agency (DISA) Command Cyber Readiness Inspections (CCRIs) and other Department of Defense or Department of the Army Cybersecurity related inspections/evaluations.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prepare synthesized product for customers by researching, analyzing, and reporting intelligence via appropriate reporting vehicles, in response to Intelligence Community (IC) requirements and in accordance with NSA missions of Signals Intelligence, Information Assurance and Computer Network Operations.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This program will unify the DOD Fourth Estate Defense Agencies and Field Activities’ common use information technology systems, personnel, functions and program elements under the direction of DISA’s Fourth Estate Network Optimization program office.
$145,000 a yearFull-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are looking at hiring talented and motivated junior Software Engineers to develop, maintain, and enhance complex and diverse software systems (e.g., processing-intensive analytics, novel algorithm development, manipulation of extremely large data sets, real- time systems, and business management information systems) based upon documented requirements.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Research, synthesize, exploit, evaluate, and analyze all-source reporting on FIE targeting USG critical technologies, programs, information, and supply chains. Coordinate, collaborate, and/or engage with customers and stakeholders to share threat information and/or develop and operationalize an enterprise security risk management methodology across Government and industry stakeholders.
Full-timeExpandApply NowActive JobUpdated 1 month ago
information technology jobs Company: Bae Systems Usa in Castine, ME
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.