- UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience with computer and network security, authentication, and cryptography. Demonstrated experience with Intelligence Community Directive (503), Committee on National Security Systems Publications (CNSSP) 1253, Federal Information Processing Standards (FIPS) 140-2, 199, 200, National Institute of Standards and Technology (NIST) Special Publication (SP) 800-37, 800-39, and 800-53.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Computer Software, Information Technology and Services, Healthcare, Management Consulting, Computer & Network Security, Defense & Space, Data and Analytics, Government Administration.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This is a full-time on-site role for a Red Team Operator SME & Advanced Tools Developer at US Courts Administrator Office located in Washington DC. The Red Team Operator SME & Advanced Tools Developer will be responsible for conducting red teaming exercises, performing penetration testing, physical penetration testing and developing advanced tools to enhance offensive cyber security capabilities.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Computer Software, Information Technology and Services, Management Consulting, Defense & Space, Government Administration. QVine is a leading provider of Agile software development, cloud computing, big data, and other Information Technology (IT) services in the National Security and Defense sectors.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As the Access Control Specialist , you will be responsible for providing administrative security services to the compound, such as obtaining security clearances on employees and visitors (needed to assist in arranging visit authorizations to gain access to restricted areas.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Goldbelt Hawk designs, develops, and implements comprehensive solutions for problem spaces, including computer security, scalable architectures, advanced analytics, artificial intelligence, and network/data center operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of progressively responsible experience in Cyber Security, InfoSec, Security Engineering, Network Engineering with emphasis in cyber security issues and operations, computer incident response, systems architecture, data management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Clearance Requirement: This position requires a Secret clearance and the ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability and TS/SCI clearance. BS Computer Science, Cybersecurity, Computer Engineering or related degree; or HS Diploma and 10+ years of host or digital forensics and network forensic experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
LexisNexis Special Services Inc (LNSSI) provides data-driven operational and tactical Pattern Analysis, Geolocation Analysis, Entity & Anomaly Detection and Next-Event Prediction in support of National Security and global missions in countering weapons of mass destruction, counter proliferation, counterintelligence, transnational organized crime, and trafficking.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
An Associate of Science (A.S.) or Bachelor of Science (B.S.) degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security) In lieu of a degree, at least two (2) years of network-related experience is required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate ability to properly monitor and use computer-based security systems, fire alarm systems, and facilities monitoring systems. Employees hired prior to the September 1, 2021 job description update (to certification section) will obtain their Virginia DCJS Unarmed Security Officer License within 6 months of the effective date of the job description version, no later than March 1, 2022.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, they respond to computer security breaches to re-establish protections and make required reports. Active CompTIA Security+ or CCNSecurity, CySA+ GICSP, GSEC, Security+ CE, CND, SSCP is a plus.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Figure Eight platform transforms audio, video, text, and images into high-quality annotated data to support a variety of use cases ranging from computer vision and search relevance to data categorization and natural language processing (NLP.
Full-timeExpandApply NowActive JobUpdated Yesterday
computer security jobs in Arlington, VA
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.