- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Cyber Security Analyst (Data Protection/DevOps) This role reports under the Operations/DevOps function within Cyber Security Threat Management. Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate applies current analytical and logical thinking to the design, architecture, development, evaluation, testing, and integration of computer systems, appliances, and networks involving the architecture and implementation of Cyber Security tools in a hybrid environment.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with setting up Power Platform system settings (Security, Data Management, Auditing) possibly through Dynamics 365. Writing user stories and acceptance criteria based on business-focused functionality as well as technical capabilities (works with both the Product Owner and development team.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cloud Security Architect will serve as the lead for architecting and overseeing the development of security practices, services, and solutions to ensure the security posture of the infrastructure is maintained and continually improved in accordance with current and emerging Department of Defense (DoD), customer, and Leidos policies.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Subject matter expertise in one or more of the following areas: All Source Analyst; Information Operations/CI Analyst; Geo-Spatial Analyst; Network Analyst (Physical); Threat/Target Analysis; Cyber Analyst (Logical); Insider Threat Analyst; Social Media/Big Data/Deep (Dark) Web Analyst.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cloud Data Engineer – Active US Security Clearance Required. · Active Secret or Top Secret US Security Clearance Required. Our team supports all phases of analytic work product development, from the identification of key business questions through data collection and ETL, and from performing analyses and using a wide range of statistical, machine learning, and applied mathematical techniques to delivery insights to decision-makers.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide analysis and remediation for DISA Security Technical Implementation Guidelines (STIG) for all responsible technologies in preparation for the annual Commanders Cyber Readiness Inspection (CCRI.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee the effective support of the D365 applications to include proactive engagement in the remediation of software issues such as application code defects, configuration issues, custom code quality, pattern/data mismatch and security issues across the integrated business systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience that demonstrates a strong knowledge and skill of information security technology focusing on IAM Applications (e.g., ForgeRock, SailPoint, RSA, Daon, Ping, Azure, SiteMinder, etc.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Within 6 months, obtain Defense Counterintelligence and Security Agency (DCSA) course certifications in SAP Mid-level Security Management, Introduction to Special Access Programs, Introduction to DoD Personnel Security Adjudication, Derivative Classification, Protection of Personally Identifiable Information (PII), and Defense Information Security System (DISS) Virtual Training for Security Professionals.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide cyber security guidance to internal personnel on threats to external accounts (e.g. employee personal accounts, official social media, etc. - Must possess one of the following certifications: CAP, CASP+ CE, CCISO, CCNSecurity, CISM, CISSP (or Associate), CISSP (or Associate), CND, CSSLP, CySA+, GICSP, GSEC, GSLC, Security+ CE, SSCP.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Good knowledge in technical concepts - Security, Transaction, Monitoring, Performance. Very Good knowledge and experience in Non-Functional (Technical) Requirements like Security, Transaction, Performance, etc.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Has an immediate opening for a 2nd Battalion (BN) Cyber Support Detachment (CSD)Full Stack Software Engineer to support the 1st IO Command at Fort Belvoir, VA. All candidates must have a TS/SCI level clearance to be considered for this position.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information. EM Key Solutions seeks a Software Development Analyst to work with our partners in the Defense Threat Reduction Agency (DTRA) to develop leading-edge technologies to counter WMD in support of CCMDs and transition these technologies to services and SOCOM.
ExpandApply NowActive JobUpdated 6 days ago
cyber security jobs Title: director business development Company: Bae Systems in Virginia, MN
FEATURED BLOG POSTS
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.