Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. Active Top Secret w/ SCI eligibility Government security clearance is required. ...
Design and implement data security and privacy policies and procedures. Security Clearance: TS/SCI with an appropriate agency Polygraph is required. Strong knowledge of data security, privacy, and governance best practices. ...
Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. ...
This position requires ability to obtain and maintain a TS/SCI security clearance and polygraph, which is issued by the U. ...
At ARA, our goal is to improve our nation’s safety, security, and way of life. The ideal candidate will have an active interest in working with open-source data in foreign languages, creating reports, and working within established security protocols. ...
Security Clearance: TS/SCI with an appropriate agency Polygraph is required. ...
The George Mason University Department of Police and Public Safety (Mason Police) invites applications for the part-time position of Security Officer within the Physical Security section of Mason Police. Security Officers report to the Security Manager, available for 20-25 hours per week at Fairfax,...
Summary: Typically, an entry level position for someone with no prior security experience, someone with some prior law enforcement or military experience needing additional training or experience to acclimate to the private security environment. May stand an individual post in less complex environme...
Additional considerations include prior security experience in a healthcare environment. ...
Senior Manager of Demand Forecasting and Supply Security. Use knowledge of sources and suppliers across the industry to meet complex requirements and to ensure supply security,. ...
Knowledge of: ICD-705 Tech Spec, National Industrial Security Program Manual, DoD Information Security and SCI policies and regulations, and Committee on National Security Systems publications, and provide general guidance of TEMPEST concepts and requirements. Conduct Physical Security Training, to ...
Mastery of multiple programming languages, secure coding principles, cybersecurity tools, and cloud security (desirable). Mastery of multiple programming languages, secure coding principles, cybersecurity tools, and cloud security (desirable). All qualified candidates must have an active DoD Secret ...
Security Control Assessor (Cyber Security). Lead and perform compliance reviews of computer security plans, perform risk assessments, and validate and perform security test evaluations and audits. Chenega Systems (CS) provides federal agencies empowered solutions in Cybersecurity and Data Visualizat...
Perform risk assessments and mitigation planning for intelligence systems, ensuring the reliability and security of critical assets. Collaborate with cross-functional teams, including IT, cybersecurity, and field. Active security clearance at the Secret level or higher, with eligibility for Top Secr...
Some assignments may patrol assigned site on foot or in vehicle, checks for unsafe conditions such as hazards, unlocked doors, and security violations; protects evidence or scenes of incident in the event of accidents, emergencies, or security investigations; prepares logs or reports as requested. S...
Professional security management certification is strongly desired, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), or other similar credentials. Lead IT security planning processes to e...
Malicious Software Investigators respond to and investigate computer and network security incidents; review, analyze, mitigate, and report on malicious software (i. Respond to computer and network security incidents, identify risks to computers/networks, and recommend corrective actions. Ensure secu...
Versar requires highly skilled, full-time, professional Electronic Security System (ESS) Technicians for the accomplishment of complex electronic security system preventative and corrective maintenance tasks. Versar has a unique opportunity for self-motivated security professionals, able to work ind...
Define system security requirements in coordination with security stakeholders including system engineers, program managers, security control assessors, and authorizing officials. ISC)2 Certified Information System Security Professional (CISSP) or Certified Cloud Security Professional (CCSP) certifi...
Versar requires highly skilled, full-time, professional Electronic Security System (ESS) Technicians for the accomplishment of complex electronic security system preventative and corrective maintenance tasks. Versar has a unique opportunity for self-motivated security professionals, able to work ind...
Perform risk assessments and mitigation planning for intelligence systems, ensuring the reliability and security of critical assets. Collaborate with cross-functional teams, including IT, cybersecurity, and field. Active security clearance at the Secret level or higher, with eligibility for Top Secr...
The Information Security Architect is responsible for designing, implementing, and maintaining robust security measures to protect an organization’s systems, networks, and applications. Assess security risks, identify vulnerabilities, and define security requirements. Recommends innovative security ...
Security Control Assessor (Cyber Security). Lead and perform compliance reviews of computer security plans, perform risk assessments, and validate and perform security test evaluations and audits. Chenega Systems (CS) provides federal agencies empowered solutions in Cybersecurity and Data Visualizat...
Our Security Specialists support our Industrial Security Consultants with personnel security activities. Support our Industrial Security Consultants with personnel security activities and personnel maintenance in support of their client’s security programs. FSO Program Management and Industrial Secu...
Security Incident Analyst (SIA). Your work in cyber security at GDIT will have an impact on securing our clients’ missions and ensuring we. The SIA investigates incidents involving information technology (IT) assets and DIA personnel to the DIA Computer Network Defense Center (DCNDC) and Information...