ASRC Federal Broadleaf Division is seeking a qualified Command & Control (C2) System Operations Research Analyst to support our Langley Air Force Base customer. ...
Secret clearance and verify, before applying, that you meet the minimum requirements of the position.Supporting FCC's FID/CDD, the contractor shall assist with the development, integration, and publication of Army Operating Concept (Client) Cross-Functional Annexes (CFAs), Gaps, and the execution of...
ASRC Federal Broadleaf Division is seeking a qualified Command & Control (C2) Systems Operations Research Analyst to support our Langley Air Force Base customer. ...
A company is looking for an Information Security Analyst for a 12-month remote contract role in the insurance domain. ...
Computer System Security Analyst. As a Computer System Security Analyst. ...
A company is looking for a SME FISMA Security Analyst to support federal compliance and governance requirements. ...
Computer System Security Analyst. As a Computer System Security Analyst. One of the Largest IT Staffing Firms in the US - Ranked #3 by Staffing Industry Analysts (SIA, 2024). One of the Largest Staffing Firms in the US - Ranked #13 by Staffing Industry Analysts (SIA, 2024; includes Innova Solutions,...
A company is looking for an Epic Security/SER Analyst to review user access and ensure proper permissions. ...
Senior Security Incident Responder/Analyst. Assist with security assessment teams to ensure compliance with ICAM security standards. CACI is seeking a Senior Security Incident Responder to Join our Kessel Run All-Domain Operations Suite (KRADOS) team where you will be working to support the moderniz...
M Possess an active Top Secret security clearance Prefer official JFHQ-DODIN inspector training Experienced with identifying, implementing and validating DISA Security Technical Implementation Guides (STIG) Experienced in one or more of the following technical and security domains: operating systems...
Title: Operations Research and Systems Analyst. The operations research and systems analyst provides technical support for interoperability and information technology (IT) initiatives. The analyst applies analytical and mathematical techniques to solve complex problems and optimize decision-making i...
Experienced in one or more of the following technical and security domains: operating systems (Microsoft Windows Operating System (OS), Unix, Linux); Layer 2 switching; network and system security scanning; physical security; wireless communications; cross domain solution (CDS); virtualization; data...
Ensure physical and environmental protection measures are executed with appropriate security officials Ensure hardware, software, and firmware on ISs are operated, maintained, and disposed of IAW security policies, configuration management policies, and procedures as outlined in the security authori...
Information Security Analyst (SME). Perform the supporting technical role and actions necessary to support and participate in the Cybersecurity authorization of classified networks and systems. Interpret and remediate scan results in the context of defense in depth, network/computer security, consis...
Client Solution Architects (CSA) is currently seeking a Program Manager Operations Security Analyst to support a funded program at Langley AFB. Update current security guidance policy letters, Standard Operating Procedures (SOPs), Program Security Classification Guides, Tactics and Training guides, ...
The IT Security Analyst supports the client’s Information Security mission by implementing results-oriented strategic approaches, plans, programs, and procedures. The IT Security Analyst supports the client’s Information Security mission by implementing results-oriented strategic approaches, plans, ...
M Possess an active Top Secret security clearance Prefer official JFHQ-DODIN inspector training Experienced with identifying, implementing and validating DISA Security Technical Implementation Guides (STIG) Experienced in one or more of the following technical and security domains: operating systems...
Cybersecurity Analyst (Security System Administrator (ACAS/HBSS)). This is a Cybersecurity Analyst (Security System Administrator (ACAS/HBSS)) position at the SESD, National Simulation Center, Fort Gregg Adams, VA in support of the National Simulation Center (NSC) Support Operations (SO) task order ...
How an Information Security Analyst Will Make an Impact:. Manages system vulnerabilities in accordance with security requirements utilizing NIST continuous monitoring standards, RMF critical security controls and counter measures based on risk assessments of mission systems. Responsible for gatherin...
Huntington Ingalls Industries – Mission Technologies is seeking a Computer Systems Security Analyst who will be responsible for all eDiscovery activities across the EDRM model for litigation and investigation support; Legal Hold preservation; Evidence collection; Evidence processing for indexing par...
Title: Operations Research and Systems Analyst. The operations research and systems analyst provides technical support for interoperability and information technology (IT) initiatives. The analyst applies analytical and mathematical techniques to solve complex problems and optimize decision-making i...
We are seeking a dedicated and detail-oriented Security Customer Success Analyst to join our new Security Product Team. Job Title: Security Customer Success Analyst. Best Practices: Share industry best practices and security insights with customers to help them enhance their security posture. In thi...
The Authorization and Accreditation Officer will work with others on program security team to provide for all aspects of security . Security documentation to include, but not limited to, system Security Plans (SSPs), Plan of Actions and Milestones (POA&Ms), and any other artifacts to support the Bod...
Innova Solutions is immediately hiring a Computer System Security Analyst Position type: Full-time - ContractDuration: 12+ Months Location: Newport News, VA 23607 As a Computer System Security Analyst, you will: Conducts a compliant validation process for quality information technology systems which...