Additionally, the department has over 200 graduate students in the Applied Information Technology (AIT) and MS in Information Systems (INFS) programs. Adjunct Faculty, Information Sciences and Technology. The Department of Information Sciences and Technology (IST) has 44 full-time faculty members wi...
Bachelor of Science in Computer Science, Information Technology, Cybersecurity, or related field with 10+ years of experience. Advanced degrees in Computer Science, Information Technology, Cybersecurity, or related field. A global technology and professional services company that delivers consulting...
JOB SUMMARYThe Technology SME - IT Pro ject Manager manages complex projects from planning thro ugh delivery. D evelops criteria for evaluating programs, proposals, and other pertinent information related to project assignments. ...
A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U. This is an IT Service Management contract in support of GENM-O’s mission is to enable information dominance from the tactical edge to the home station f...
The Cybersecurity Assessor will be responsible for NIST 800-53 / DHS 4300A based assessments in support of ongoing A&A efforts for Customs and Border Protection (CBP).This includes conducting the necessary interviews, documentation review, and testing required to validate control implementations....
Cutting-edge technology you can learn from. ...
A degree in Information Technology, Computer Science, or related field is preferred. ...
Provides guidance and collaborates with VCU Technology Services and VCU Medical Information Systems to implement technology solutions for the school and acts as primary liaison to the central IT organizations. Enhance the compliance and risk management posture of the School of Medicine in conjunctio...
As the Information Technology Support Technician, you will help ensure that all existing networks and systems for the restaurants and support center offices are secure and functional, including restaurant technology needs during service hours (nights and weekends). Information Technology Support Spe...
Army Europe as part of our Enterprise Mission Information Technology Services (EMITS) program in Hohenfels, Germany. Cutting-edge technology you can learn from. ...
A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U. Maintains current knowledge of relevant technology as assigned. Cutting-edge technology you can learn from. Salary and Benefit Information. ...
Cutting-edge technology you can learn from. ...
A global technology and professional services company that delivers consulting, technology and mission services to every major agency across the U. Stores articles in bins, on floor, or on shelves according to identifying information. Cutting-edge technology you can learn from. Salary and Benefit In...
Bachelor’s Degree in Computer Science, Information Technology, or other related technical discipline, or the equivalent combination of education, technical training, or work/military experience. Ability to communicate technical information both orally and written. Cutting-edge technology you can lea...
Information technology specialists are responsible for maintaining, processing and troubleshooting military computer systems/operations. Job training for an information technology specialist requires 10 weeks of Basic Combat Training and 20 weeks of Advanced Individual Training with on-the-job instr...
BS/BA in Computer Science, Information Systems, Engineering, Business or related field or relevant experience. Cutting-edge technology you can learn from. ...
Required Qualifications: Minimum of a master’s degree in information systems technology or computer related field, or master’s degree in related field with 18 graduate semester hours of information systems technology or computer related field coursework. Teach daytime, evening, and/or online section...
Maintain confidentiality of assets and information pertaining to personnel security. Elicit, articulate, and document information in a well-organized manner. ...
Bachelor’s degree in information technology, Computer Science, Information Systems, or a related field, or equivalent experience. Qualifications:-Bachelor’s degree in information technology, Computer Science, Information Systems, or a related field, or equivalent experience-6+ years of experience wo...
You’ll apply the latest technology and provide operational support to deliver actionable intelligence for the Intelligence Community. Our work depends on Intelligence Operations Support Senior joining our team to be responsible for gathering, analyzing, and disseminating intelligence information to ...
Familiarity with and ability to leverage existing and emerging free-ware monitoring options for alerts and management of online identity information content and articulating to customers the process for opting out and managing online identity information through marketing services. You will utilize ...
Our work depends on a SIPRNet Project Manager joining our team to plan, initiate, and manage information technology projects and IT operations at the Defense Health Headquarters (DHHQ) in Falls Church, VA, and DHA offices in the National Capital Region. Plan, initiate, and manage information technol...
Apply your expertise to advance the mission and optimize our business strategy as a Security Officer Associate at GDIT.Here, you’ll support solving some of our clients’ biggest challenges and help us grow the business.At GDIT, people are our differentiator.As a Security Analyst 2 you will help ensur...
Demonstrated experience in a DOD Information Technology environment. Application of industry accepted standards and best practices related to Information Management Operations and with ITSM best practices. Experience designing and developing information processing, computer systems, and electrical c...
You will be responsible for the full range of security issues including architectures, firewalls, electronic data traffic, and network access- Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Own your c...