Information Security Consultant, Federal (FedRAMP, NIST, CMMC). Information Security Consultant. Comfortable across all disciplines of information security, this consultant will be responsible for assessing compliance and risk on a wide variety of client projects for some of the world's largest ...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture and Design, API security, and User Access Management. Senior Manager, Information Security Office Cons...
Information Security Consultant, Federal (FedRAMP, NIST, CMMC). Information Security Consultant. Comfortable across all disciplines of information security, this consultant will be responsible for assessing compliance and risk on a wide variety of client projects for some of the world's largest orga...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Senior Manager, Information Security Office (ISO) Consultant. At Capital One...
Knowledge and understanding of security engineering basics including but not limited to a system and network security, authentication and security protocols, cryptography, mobile and web application security. Information Security Consultant (Mobile and Web Application Penetration). The right candida...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Data Security, Vulnerability Management, Network Architecture and Design, API security, and User Access Management. Center 3 (19075), United States of America, McLe...
The employees supporting our customers deliver unique, high-value mission solutions while effectively leverage the technological expertise of our valued workforce to meet critical mission requirements in the areas of Data Analytics and Software Development, Engineering, Targeting and Analysis, Opera...
Arcfield was purpose-built to protect the nation and its allies through innovations in digital transformation, space mission engineering and launch assurance, miniaturized sensors and satellites, advanced modeling and simulation, cybersecurity, and conventional and hypersonic missile support. This p...
Cyber Security Analyst will conduct research, evaluate system configuration data, and provide recommendations to enhance security posture of network and infrastructure. Seeking a Cyber Security Analyst to detect, analyze, and mitigate cyber threats. Identify gaps in cybersecurity systems and process...
A solid understanding of Windows and Linux systems, general operating system security practices, TCP/IP networking, and network security concepts is required. Understanding of federal Cyber Security Guidance such as NIST SP 800-37 – Guide for Applying the Risk Management Framework (RMF) to Federal I...
Experience in domains such as but not limited to security and counterintelligence, data collection and analysis, supply chain management, cybersecurity and risk management is desired. LMI is seeking a skilled Supply Chain Resilience Policy Consultant to support the United States Air Force. A success...
SAIC is seeking an experienced Network Engineer to serve as an IT technology integrator that utilizes networking hardware and virtual infrastructure to support customer networks. The successful candidate will work closely with the customer to continually evolve and integrate best practices for infra...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. MITRE is seeking a Digital Forensics and Intelligence Analyst to support our counterintelligence mission within the National Intell...
Interface with other IA team members, other security disciplines (industrial security, physical security, special programs security, etc. Interface with other IA team members, other security disciplines (industrial security, physical security, special programs security, etc. Information Systems Secu...
Cyber Security Consultant (SOAR) . Compensation for the Cyber Security Consultant:. Responsibilities of the Consultant include:. Qualifications for the Consultant:. ...
Nightwing is looking to fill a part-time Information Review and Release Analyst position, flexible work schedule, located in the Tyson’s Corner, VA area, in support of a dynamic fast paced business office on the KODIAK Program. As a prospective employee of Nightwing, you’ll have the chance to contri...
Nightwing is looking to fill an Information Review and Release Analyst position, in the Warrenton area. As a prospective employee of Nightwing, you’ll have the chance to contribute to our continued success and shape the future of our cybersecurity, intelligence, and services offerings. Supports a Fi...
The Cyber Systems Engineer Project Management Technical Support provides support to the customer in the area of Cyber Security. Arcfield was purpose-built to protect the nation and its allies through innovations in digital transformation, space mission engineering and launch assurance, miniaturized ...
ITSM Software Development Engineer. The ITSM Software Development Engineer. The ISTM Development Engineer is able to assess the business impact of specific technologies and proposed strategies and to identify and address technical or operational risks. Engineers ITSM Suite such as Remedy ARS or Serv...
M IAT Level II Technical Certification (Security+ CE, CCNA + Security, SSCP, CYSA+) or equivalent AND an Incident Response Certification (CEH, GCIH, GCIA, GNFA, or comparable certification) AND relevant Cloud Security Certification (AWS or Azure). As a prospective employee of Nightwing, you’ll have ...
Mission Strategy Consultant, Mid. It’s why we’re looking for an organizational transformation and change consultant like you who can identify long-term goals and create the processes needed to achieve them. As an organizational transformation and change consultant, you’ll use your expertise to asses...
The ideal candidate will have a strong understanding of cyber analytic principles and practices, experience supporting cyber threat analysis, the production of cyber-related analytic products, and the technical analysis of targeted cyber environments and systems, as well as managerial experience. GC...
As a Cyber Threat Hunt Analyst on our team, you play a vital role in our nation’s security by helping to enhance our security posture. Cyber Security Operations Center (CSOC) in. Bachelor's degree in Cybersecurity, Computer Science, Information Technology, or a related field; High School diploma plu...
BS, MS, or PhD in Electrical Engineering, Computer Engineering, Mechanical Engineering, Ocean Engineering, Physics, Mathematics, or related field. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise ...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. The talent and skillsets of L211 SME’s deliver unique and mission-critical procurement expertise across six (6) of MITRE’s Federall...