- UpvoteDownvoteShare Job
- Suggest Revision
RCAs are responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to support an evolving DoD Red Team. Additionally, RCAs act as subject matter experts on variety of complex topics related to varied cyber threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Required Certifications: Cisco Certified Network Associate (CCNA) or Cisco Certified Network Professional (CCNP);DoD Work Role: Network Operations Specialist certificationEducation: BS/BA degree in Cyber Security, Computer Science, Management Information Systems, Engineering Information Technology Management, Information Science, Mathematics, Computer Science, Information Systems Management or a related technical or IT discipline.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5-8 years’ experience in payment card or information security industry, all-source cyber intelligence organizations, investigating payment card, cybercrime fraud. Key measures of success for this position include: reduced successful cyber fraud targeting financial institutions, the ability to support early identification of new fraud trends and tactics through intelligence collection and investigations, rapid response, triage and analysis of technical forensic investigation reports and ability to conduct analysis of material cybercrime events.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Argo Cyber Systems is seeking a Technical Engagement Network (TEN) Lab Manager with experience in customer service and IT support operations to be a member of the IT support services desk in the customer environment supporting analysts and business continuity of the customer mission.
$80,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Desired Qualifications Possess the knowledge, skills, and ability to operate the advanced cyber analytical toolkit and perform required assessmentsPossess working knowledge of DoD’s IT system and network certification and accreditation processes to include system security authorization agreementsExperience conducting Information Operations Computer Network Defense/Exploitation assessmentsProgramming experience (Perl, Python, C, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Systems Engineering Specialists (Electronic Documentation, System Administration, Network Administration, Systems Testing, Database Administration, Project Management, Information Assurance, Cybersecurity, Data Management, Data Governance, Data Quality, Test Data Management, Data Architecture, Data Security Specific Experience: Programming (SQL, JAVA, Python, R), Data Source Creation, Report Creation and Data Visualization, Data Wrangling, Data Pipelines (designing, implementing, and maintaining.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform assessments tests and provide information and recommendations; utilize assessment techniques which may include control and evidence review, penetration testing, or scanning platforms; stay abreast with the latest security assessment trends, tools, and techniques to collect evidence as needed to support security reviews and ensure evidence is properly maintained.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will ensure the development, deployment, operations, implementation and support of component information systems that are consistent with cyber security policies and procedures.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DOD Cyber Workforce (DCWF) 8140 (621) Software Developer: A BS degree in Information Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an ABET accredited or CAE designated institution fulfills the educational requirement for this WRC (conferred within 5 years or able to prove continuous relevant work experience) -OR- Personnel Certifications: Cloud+ or GICSP or SSCP or Security+ or GSEC. If none, must be willing to obtain in first 30-days.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Description Own your career as a Information Security Specialist at GDIT. Here, you'll have the opportunity to build strong lines of cyber defense using cutting-edge technologies.
$138,000 a yearFull-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Title: DHS Sr. Cyber Network / Computer Systems Engineer Location: Washington D.C. Near the Metro Center Clearance: TS/SCI Job description: Our great client is on contract to provide division-wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) security authorizations, and deliver cyber security compliance for DHS Operational Technology Mission Systems.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber security vulnerability network security scanning using current approved cyber security tools such as ACAS scan tool, current SIEM system, data security analytics, and HBSS to monitor/identify network and system vulnerabilities.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The contractor shall be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for the NAVFAC FE Facility Engineering Command (FEC) in Yokosuka Japan.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Support the OCIO/IMO with cyber security/IS security information to respond to taskers. Koniag Data Solutions, LLC, a Koniag Government Services company, is seeking a mid-level Information Assurance/Security Specialist with a Secret Clearance to support KDS and our government customer in Washington, DC. This position is hybrid: 2 days on-site at Fort McNair and other days remote per client’s requirements.
Full-timeExpandApply NowActive JobUpdated 25 days ago
cyber security information network support jobs in Alexandria, VA
FEATURED BLOG POSTS
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.