- UpvoteDownvoteShare Job
- Suggest Revision
BecTech is seeking a skilled Cybersecurity Specialist with a Navy Qualified Validator (Level II) certification and an active Secret Clearance to work on a NAVSEA contract in Washington, DC. As a key member of our team, the Navy Qualified Validator will play a vital role in ensuring the security and integrity of shipboard and shore-based operational sites, laboratory/development environments, and land-based test sites in support.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We value broad and deep technical knowledge, specifically in the fields of cryptography, network security, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a core technical person, who has hands-on Database administration experience on UNIX/Linux and/or worked as L3 level support engineer and/or having equivalent knowledge.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and resolve incident support tickets in BMC Remedy and ServiceNow. 2-3+ years of experience in IT Support, Help Desk, Network Administration, and/or Mobile Device Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience and expert knowledge NIST guidelines, FISMA, Cybersecurity principles and methodologies, Executive Orders (EO's), Office of Management and Budget (OMB) Memorandums, Federal, DoD and CISA Technical Reference Architectures, Maturity Models, Risk Management Framework (RMF), Cybersecurity Framework (CSF), technical knowledge of IT systems, and cloud security (is preferred.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Must possess one (1) or more of the following IAM Level II certifications: GSLC - GIAC Security Leadership Certification; CAP - Certified Authorization Professional; CISM - Certified Information Security Manager; CISSP or Associate - Certified Information Systems Security Professional; or CASP - CompTIA Advanced Security Professional.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in PKI, Identity and Access Management (IDAM), and/or identity based or related cyber security roles, working with PKI solutions in secure processing environments which must adhere to U.S. Government (USG) Information Assurance (IA) and InfoSec standards such as the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leads system and network architecture support for information and network security technologies; Develops technical security controls and secure configuration baselines for public cloud resources in AWS, Azure, and GCP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton's DSCM program encompasses technical, engineering, data analytics, cyber security, management, operational, logistical and administrative support to aid and advise DoS Cyber & Technology Security (CTS) Directorate.
$104,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Certification, including CEH, CISM, CCSP, CCSK, CISSP, or CompTIA Security+ Your technical expertise will be vital as you help customers overcome their most difficult challenges by integrating Cybersecurity technologies and solutions, including IoT, OT, and Cloud security, Automation and Orchestration (A & O), identity and access management, conditional based access, attribute-based access control, and micro-segmentation.
$139,400 - $259,000 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
One or more of following: CompTIA Security+, A+, Network+, Cloud+, Pentest+, CySA+ or CASP+ AND. Security Management: Implement and maintain security measures for Oracle Fusion Middleware components, including user authentication, authorization, encryption, and auditing, in compliance with organizational security policies and standards.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: GIAC Certified Incident Handler (GCIH) Certified Information Systems Security Professional (CISSP) CompTIA Advanced Security Practitioner (CASP+) CompTIA Cybersecurity Analyst (CySA+) Project Management Professional (PMP) Certified Scrum Master (CSM) PMI Agile Certified Practitioner (PMI-ACP) Additional Skills: Familiarity with agile principles and their integration into cybersecurity functions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support in assessing and analyzing key policy issues and nuclear security events, promoting, and protecting FEMA/CBRN equities. BryceTech is looking for an experienced FEMA CBRN Policy and Strategy SME to support the DHS FEMA, Office of Response and Recovery, CBRN program, supporting the Office of Emerging Threats Professional and Technical Services Contract.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maximus is searching for a Security Control Assessor (SCA) to join a DoD program in Arlington, VA. The Security Control Assessor is responsible for conducting a comprehensive assessment of the management, operational, and technical security controls employed within or inherited by an SAP information system to determine the overall effectiveness of the controls (i.e., the extent to which the controls are implemented correctly, operating as intended, and producing the desired outcome with respect to meeting the security requirements for the system.
$97,200Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Background Investigator will support the AOC personnel security program by conducting federal background investigations and preparing reports of investigation in compliance with Federal Investigative Standards, laws, and agency regulations.
ExpandApply NowActive JobUpdated Yesterday
technical support in person comptia security jobs Title: technician in Mclean, VA
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.