Assists in developing and maintaining knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout organization. ...
Bachelor’s degree in computer science, Information Technology, or equivalent professional experience. ...
Reviews and validates all supporting documentation required to meet Federal Information Security Management Act (FISMA) and National Institute of Standards and Technology (NIST) compliance, including System Security Plan (SSP), Threat Model, System View 1, System View 2, Incident Response Plan, Busi...
Fort Knox, KY OR Remote Position.MA/MS preferred; PMI certification required.Responsible for performance of the work.Has full authority to act on all contract matters relating to daily operation of contract.Must be available between 8:00 AM – 4:00 PM ET, Monday through Friday, except Federal holiday...
Risk Management Framework Lead.Fort Knox, KY OR Remote Position.BA/BS or MA/MS preferred; IAT Level II; Computing Environment Certification.IAT Level II (CySA+, CND, SSCP, GSEC, CCNA-Security, or Security+ recommended).Computing Environment Certifications: .Must have experience in RMF concepts and u...
Bachelor's degree in Medical Laboratory Science or Medical Technology. ...
MA/MS preferred; Security+; IAT Level III; Computing Environment Certification.IAT Level III (CISSP, CISM, CASP+, or CISA recommended).Computing Environment Certifications: .Serves as Compliance Detection Lead with experience gathering data on information systems and device configurations, which is ...
As a Technology Improvement Leader, your purpose is to drive efficiency and productivity by identifying and implementing process enhancements across the technology ecosystem. This position is a member of the technology organization and a member of a team accountable for ongoing process improvements,...
Risk Management Framework Lead.Fort Knox, KY OR Remote Position.BA/BS or MA/MS preferred; IAT Level II; Computing Environment Certification.IAT Level II (CySA+, CND, SSCP, GSEC, CCNA-Security, or Security+ recommended).Computing Environment Certifications: .Must have experience in RMF concepts and u...
The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technology analyst in the company. Establish relationships with key architects and executive technology leadership across the enterprise technology organization and collabor...
BA/BS or MA/MS; IAT Level II; Computing Environment Certification.Serves as Compliance Detection Lead.Must possess experience gathering data on information systems and device configurations, which is used for system identification, maintenance, cyber threat assessment and investigation, vulnerabilit...
Sierra Nevada Company is seeking a dynamic and innovative leader to join our team as the Vice President of Technology. In this role, you will drive transformative advancements across the Mission Solutions Technology (MST) Business Area in three key areas: Manned/Unmanned Aircraft Open Architecture I...
Business Analyst – Functional.Instructs, directs, and checks work of project engineers and personnel.Responsible for the completion of assigned engineering and task-related projects within budgetary and scheduling guidelines.Leads group of engineers, analysts, and/or technicians assigned for duratio...
The College of Science, Technology, Engineering, and Mathematics at Eastern Kentucky University offers a broad range of degree programs in STEM areas that meet the needs of our students and prepare them for their chosen career or advanced studies. The Department of Engineering and Technology is loca...
BA/BS Degree (AA Degree accepted with additional years of experience); Lean Six Sigma Green Belt (desired).Quality Assurance activities (7+ years of experience required with AA Degree).Computing Environment Certifications: .Must have a minimum of 5 years’ experience performing Quality Assurance acti...
The College of Science, Technology, Engineering, and Mathematics (CSTEM) at Eastern Kentucky University (EKU) invites applications and nominations for the combined position of Chair of the Department of Engineering and Technology, and the Director of the Manufacturing Engineering program (housed wit...
Web Software Developer – Intermediate.BA/BS or MA/MS preferred; Security+; IAT Level I; Computing Environment Certification.IAT Level I (CND or A+ recommended).Computing Environment Certifications: .Required (Agile Development, MS SharePoint, Windows certs recommended).Develops, codes, tests, and de...
Enterprise sales -Technology or solution based selling experience is encouraged but not required. Experience working with Technology OEM's. ...
Assists in developing and maintaining knowledgebase on changing regulatory, threat, and technology landscapes to continually develop or maintain security policies and standards, and ensure compliance throughout organization. ...
As Artificial Intelligence Marketing Technology Manager, you will be the technological cornerstone of our marketing & experience team, driving innovation and efficiency through the strategic use of generative AI, machine learning, and predictive analytics. ...
Cyber Operations Research Analyst – Senior.MA/MS preferred; Security+; IAT Level III; Computing Environment Certification.IAT Level III (CISSP, CISM, CISA, or CASP+ recommended).Computing Environment Certifications: .Leads and participates in analysis of actual and predictable interacting operationa...
BA/BS Degree (AA Degree accepted with additional years of experience); PMI certification (desired).IT Program Management (7+ years of experience required if holding AA Degree).Computing Environment Certifications: .Must have a minimum of 5 years’ experience.Oversees the operational planning, establi...
Cyber Operations Malware Analyst – Senior.MA/MS preferred; Security+; IAT Level III; Computing Environment Certification.IAT Level III (CISSP, GCIH, or GCED recommended).Computing Environment Certifications: .Leads and participates in evaluation and analysis of complex malicious code through utiliza...
Uses current information security technology disciplines and practices to ensure confidentiality, integrity, and availability of information assets IAW established standards and procedures. Develops and maintains knowledgebase on changing regulatory, threat, and technology landscapes to continually ...
Documentation Specialist – Intermediate.Prepares and/or maintains systems, programming, and operations documentation, including user manuals.Maintains current internal documentation library.Competent to work on most phases of documentation.Supports Cybersecurity Policies and Reports functional area....