If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be consid...
Computer Network Defense (CND) Analyst. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or mig...
In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, and/or network and systems administration. Evaluate targets using collection and...
Help develop mitigations to strengthen network defenses and protect against attacks on network infrastructure devices or systems. You can advance your career as you develop increasing expertise in networking protocols and architectures, cloud security, Internet of Things protocols, and advanced netw...
Digital Network Exploitation Analyst. Experience may also include engineering hardware or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. A degree in ...
Knowledge of computer networking concepts and protocols, and network security methodologies. The Pen Test Vulnerability Analyst candidate will support a rigorous testing schedule in collaboration with third-party Penetration Testers in support of customer requirements. Knowledge of network access, i...
Fourteen (14) years' experience as a systems engineering in programs and contracts of similar scope, type and complexity is required for a Systems Engineer II. Bachelor’s degree in system engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related disc...
INSCOM G-4 Global Intelligence Logistics and Engineering (GILE) Support contract. ...
CACI is seeking mission focused Chinese Language Analysts to join a team of dynamic Intelligence Community professionals supporting cryptologic National Security objectives!. Chinese Operational Language Analyst. ...
CACI is seeking mission focused Arabic Language Analysts to join a team of dynamic Intelligence Community professionals supporting cryptologic National Security objectives!. Arabic Operational Language Analyst. ...
Technical Operations Engineer. This is an opportunity to work with a team of talented and motivated engineers and to make critical contributions to projects that impact our nation and our nation’s warfighters. Understand and communicate client feature requests to project engineering teams and projec...
S government Top Secret security clearance with SCI eligibility (TS/SCI). ...
S government Top Secret security clearance with SCI eligibility (TS/SCI). ...
Knowledge and understanding of the National Security Agency/Central Security Service (NSA/CSS) policies and procedures. ...
Document technical aspects of school data elements, data models, and data mappings. MCG Education and Data Analyst. Design, develop, and support scalable, high performance OW/BI applications and data repositories and BI metadata. Lead program of school database/application design and data modeling i...
The Cyber Institute's System Administrator (SA) is responsible for effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure within the AU Cyber Institute. IT manages all Augusta University systems, networks, data, and ...
JobPosting","title":"Network Sustainment Engineer II","datePosted":"2024-10-23T00:00:00","validThrough":null,"description":"\nSegra is searching for a dynamic and experienced Network Sustainment Engineer II. Network Sustainment Engineer II. Network Sustainment Engineer II. OSS systems, network opera...
Lottery Business Intelligence Analyst. The Insights Analyst will provide dedicated analytic expertise for the Lottery Insights group by supporting a specific interactive lottery customer. The Insights Analyst will use data, tools, and analytic techniques to evaluate industry performance in a number ...
ADP is hiring a Deal Architect (DA).Are you inspired by transformation and making an impact on the lives of millions of people every day?.Are you a natural networker with a head for numbers and a passion for process?.Are you empathic to client needs and internal partners with a hunger to drive succe...
The Network Engineer's role is to support the stable operation of the Piedmont Healthcare computer network. The person will perform basic installation, configuration and maintenance, and document all network hardware, software, and communication links while ensuring minimal network downtime. The per...
A minimum of five (5) years in a Network Administrator position or relevant technical experience with network hardware and a Microsoft network environment. Which level describes your work experience in a Network Administrator position or relevant technical experience with network hardware and a Micr...
Digital Network Exploitation Analyst. Experience may also include engineering hardware or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. A degree in ...
Computer Network Defense (CND) Analyst. Use information collected from a variety of computer network defense resources (including, but not limited to, intrusion detection system alerts, firewall and network traffic logs, and host system logs) to identify, analyze, and report events that occur or mig...
Digital Network Exploitation Analyst. Experience may also include engineering hardware or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or network and systems administration. A degree in ...