Experienced in one or more of the following technical and security domains: operating systems (Microsoft Windows Operating System (OS), Unix, Linux); Layer 2 switching; network and system security sca...
read moreExperienced in one or more of the following technical and security domains: operating systems (Microsoft Windows Operating System (OS), Unix, Linux); Layer 2 switching; network and system security sca...
read moreApex Systems has an urgent need for a Microsoft Project Analyst in Norfolk, VA! This will be a long-term contract position supporting one of our Largest Government Clients on the East Coast. Job Title...
read moreJob Title: Microsoft Project Analyst. Active Secret Clearance • Microsoft Project Analyst experience Job Description:. Apex Systems has an urgent need for a Microsoft Project Analyst in Norfolk, VA! T...
read moreJob Number: 324 Job Category: GovTech Job Title: EXPLOITATION ANALYST 3 (324)- VIRGINIA-URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job ...
read moreJob Number: 324 Job Category: GovTech Job Title: EXPLOITATION ANALYST 3 (324)- VIRGINIA-URGENT Job Type: Full-time Clearance Level: Top Secret/SCI - Full Scope Polygraph Work Arrangement: On-site Job ...
read moreExperience with cybersecurity tools to include ACAS, HBSS, VRAM, eMASS, and STIG Viewer REQUIRED QUALIFICATIONS DoD 8570/8140 IAT Level II or equivalent Active DoD Secret Clearance Information te...
read moreExperience with cybersecurity tools to include ACAS, HBSS, VRAM, eMASS, and STIG Viewer REQUIRED QUALIFICATIONS DoD 8570/8140 IAT Level II or equivalent Active DoD Secret Clearance Information te...
read moreExperience with cybersecurity tools to include ACAS, HBSS, VRAM, eMASS, and STIG Viewer REQUIRED QUALIFICATIONS DoD 8570/8140 IAT Level II or equivalent Active DoD Secret Clearance Information te...
read moreExperience with cybersecurity tools to include ACAS, HBSS, VRAM, eMASS, and STIG Viewer REQUIRED QUALIFICATIONS DoD 8570/8140 IAT Level II or equivalent Active DoD Secret Clearance Information te...
read moreM Possess an active Top Secret security clearance Prefer official JFHQ-DODIN inspector training Experienced with identifying, implementing and validating DISA Security Technical Implementation Guides ...
read moreM Possess an active Top Secret security clearance Prefer official JFHQ-DODIN inspector training Experienced with identifying, implementing and validating DISA Security Technical Implementation Guides ...
read moreEducation Requirements Bachelor's Degree Certifications Must meet Cyber Workforce 461 Systems Security Analyst Intermediate qualification requirements. Security Clearance Required Company Overview Sys...
read moreEducation Requirements Bachelor's Degree Certifications Must meet Cyber Workforce 461 Systems Security Analyst Intermediate qualification requirements. Security Clearance Required Company Overview Sys...
read moreM Must have 3 or more years of experience in the field of Cyber Security Service Provider (CSSP) formally known as Computer Network Defense – Service Provider (CND-SP), or related experience mon...
read moreM Must have 3 or more years of experience in the field of Cyber Security Service Provider (CSSP) formally known as Computer Network Defense – Service Provider (CND-SP), or related experience mon...
read moreADP is hiring a Global Data Security Analyst!. MindsetAdvise, Develop, & Coordinate among multiple cross-discipline teams to establish sustainable processes to improve data security, while avoiding pr...
read moreADP is hiring a Global Data Security Analyst!. MindsetAdvise, Develop, & Coordinate among multiple cross-discipline teams to establish sustainable processes to improve data security, while avoiding pr...
read moreIn this role, and as a critical member of the Global Security Organization for ADP, you will be responsible for the collection, review, and sharing of security control evidence, as well as understandi...
read moreIn this role, and as a critical member of the Global Security Organization for ADP, you will be responsible for the collection, review, and sharing of security control evidence, as well as understandi...
read moreMission Technologies, a division of Huntington Ingalls Industries, is looking for an Industrial Security Analyst 3 to support the Joint Force Development Research and Analysis for Joint Staff J7(JS J-...
read moreMission Technologies, a division of Huntington Ingalls Industries, is looking for an Industrial Security Analyst 3 to support the Joint Force Development Research and Analysis for Joint Staff J7(JS J-...
read moreConducts security education classes and security audits. Mission Technologies, a division of Huntington Ingalls Industries, is looking for an Industrial Security Analyst 2 to support the Joint Force D...
read moreConducts security education classes and security audits. Mission Technologies, a division of Huntington Ingalls Industries, is looking for an Industrial Security Analyst 2 to support the Joint Force D...
read moreSecurity Incident Analyst (SIA). Manage network computer and system security incidents relating to data spills, misclassifications, unauthorized software downloads, system misconfigurations, cross-dom...
read moreHuntington Ingalls Industries – Mission Technologies is seeking a Computer Systems Security Analyst who will be responsible for all eDiscovery activities across the EDRM model for litigation and inves...
read moreHuntington Ingalls Industries – Mission Technologies is seeking a Computer Systems Security Analyst who will be responsible for all eDiscovery activities across the EDRM model for litigation and inves...
read moreSecurity Incident Analyst (SIA). Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we. The SIA investigates incidents involving information technol...
read moreAs a Cyber Security Analyst you will be responsible for directly managing security incidents (e. IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required. Working knowledge of dat...
read moreAs a Cyber Security Analyst you will be responsible for directly managing security incidents (e. IAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required. Working knowledge of dat...
read moreThe Personnel Security Analyst plays a crucial role in safeguarding personnel and assets from potential security risks. The Personnel Security Analyst is a journeyman role, conducting background inves...
read moreThe Personnel Security Analyst is responsible for executing personnel security (PERSEC) functions. The Personnel Security Analyst II maintains personnel security files for all personnel of the support...
read moreAssess potential risks and make recommendations on the suitability of individuals for security clearances or access to secure facilities. Takes direction from the Personnel Security Manager III. Perso...
read moreAssess potential risks and make recommendations on the suitability of individuals for security clearances or access to secure facilities. Takes direction from the Personnel Security Manager III. Perso...
read moreIAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required. Experience with COTS technologies used in a Cybersecurity Operations Center environment desired. Working knowledge of cur...
read moreIAT Level II (GSEC, Security+, SSCP, or CCNA-Security) certification required. Performs security event and incident correlation using information gathered from a variety of sources within the enterpri...
read moreJoin our team as a Cyber Security Risk Analyst and contribute to safeguarding our organization against evolving cybersecurity threats. Position Overview: As a Cyber Security Risk Analyst, you will pla...
read moreRelevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or CompTIA Sec...
read moreUpdate current security guidance policy letters, Standard Operating Procedures (SOPs), Program Security Classification Guides, Tactics and Training guides, program indoctrinations and initial training...
read moreUpdate current security guidance policy letters, Standard Operating Procedures (SOPs), Program Security Classification Guides, Tactics and Training guides, program indoctrinations and initial training...
read more