Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. In this role you will support challenging, mission-critical projects that make a direct impact on the nation’s security and intelligence mission. ...
QinetiQ US’s dedicated experts in defense, aerospace, security, and related fields all work together to explore new ways of protecting the American Warfighter, Security Forces, and Allies. Being a part of QinetiQ US means being central to the safety and security of the world around us. Far Ridgeline...
Coordinate computer support with onsite IT Help Desk and the Network Enterprise Center (NEC) for all SIPR Room computers. CALIBRE is an employee-owned Management Consulting and Information Technology Solutions Company, looking for a qualified individual to serve as Computer Lab (SIPR) Coordinator at...
Assisting in developing and maintaining an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures. Ensuring that system security engineering is used to d...
Assess security events to drive to a resolution as required. Provide timely and sufficient response to security incidents and assessment services as required. Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC). ISC2 Systems Security Certified Practitioner (SSC...
Assisting in developing and maintaining an organizational or system-level cybersecurity program that includes cybersecurity architecture, requirements, objectives and policies, cybersecurity personnel, and cybersecurity processes and procedures. Ensuring that system security engineering is used to d...
Validate and verify system security requirements definitions and analysis and establishes system security designs as required. Provide security planning, assessment, risk analysis, and risk management as required. Design, develop, implement and/or integrate IA and security systems and system compone...
Provide computer incident and violation response support, and cyber security awareness and training Participates in technical meetings and working groups to address issues related to computer security, protection against malware and other vulnerabilities. Collaborate with the customer, team members,...
The Information Assurance Security Lead also oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Serves as the Information Assurance Security Lead for a large, complex task and will direct the execution of system security activities e...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
Provide computer incident and violation response support, and cyber security awareness and training. Participates in technical meetings and working groups to address issues related to computer security, protection against malware and other vulnerabilities. Collaborate with the customer, team members...
Validate and verify system security requirements definitions and analysis and establishes system security designs as required. Provide security planning, assessment, risk analysis, and risk management as required. Design, develop, implement and/or integrate IA and security systems and system compone...
One or more required: o CompTIA Net+ o CompTIA A+ o CompTIA Security + o Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC) o ISC2 Systems Security Certified Practitioner (SSCP) o Cisco Certified Network Associate (CCNA) Security o Certified Penetration Testin...
One or more required: o CompTIA Net+ o CompTIA A+ o CompTIA Security + o Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC) o ISC2 Systems Security Certified Practitioner (SSCP) o Cisco Certified Network Associate (CCNA) Security o Certified Penetration Testin...
Update, monitor and maintain Trellix’s Endpoint Security System (ESS) / Host-Based Security System (HBSS), ensuring virus definitions, patch versions, Security Technical Implementation Guides (STIGs), Cyber Tasking Orders (CTO) compliance and any other applicable directives on network servers and wo...
One or more required: o CompTIA Net+ o CompTIA A+ o CompTIA Security + o Global Information Assurance Certification (GIAC) Security Essentials Certification (GSEC) o ISC2 Systems Security Certified Practitioner (SSCP) o Cisco Certified Network Associate (CCNA) Security o Certified Penetration Testin...
Provide computer incident and violation response support, and cyber security awareness and training Participates in technical meetings and working groups to address issues related to computer security, protection against malware and other vulnerabilities. Collaborate with the customer, team members,...
The Information Assurance Security Lead also oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Serves as the Information Assurance Security Lead for a large, complex task and will direct the execution of system security activities e...
Provide computer incident and violation response support, and cyber security awareness and training. Participates in technical meetings and working groups to address issues related to computer security, protection against malware and other vulnerabilities. Collaborate with the customer, team members...
The Information Assurance Security Lead also oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Serves as the Information Assurance Security Lead for a large, complex task and will direct the execution of system security activities e...
Security Computer and Network Security Investigator - Case Control Officer. Computer and Network Security Investigators conduct administrative investigations (i. Respond to incidents or violations involving computers and cyber security. Incorporate all security disciplines; recommend and develop req...
The Information Assurance Security Lead also oversees the efforts of security staff to design, develop, engineer and implement solutions to security requirements. Serves as the Information Assurance Security Lead for a large, complex task and will direct the execution of system security activities e...
Update, monitor and maintain Trellix’s Endpoint Security System (ESS) / Host-Based Security System (HBSS), ensuring virus definitions, patch versions, Security Technical Implementation Guides (STIGs), Cyber Tasking Orders (CTO) compliance and any other applicable directives on network servers and wo...
Respond to computer and network security incidents, identify risks to computers/networks, and recommend corrective actions. Malicious Software Investigators respond to and investigate computer and network security incidents; review, analyze, mitigate, and report on malicious software (i. Ensure secu...
Preparing Security Authorization Packages and including documentation such as Authorization Official Out-briefs, Security Authorization Recommendations and Security Authorizations Memorandums. A Bachelor degree in Computer Science or a related engineering field with training in information security....