EnProVera, owned and operated by government veterans with extensive backgrounds in Homeland Security, Law Enforcement, the Military, and the Intelligence Community, has a long term temporary vacancy for a Data Analyst. The primary responsibility of a Data Analyst is to complete data entry of financi...
SAIC is seeking an experienced Target Analyst Reporter to support a program with direct impact to our country’s national security. The position requires an active/current TS/SCI security clearance with Polygraph and be willing and able to pass an additional polygraph as needed. The Target Analyst Re...
At ManTech International Corporation, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement. Serve as an advisor to government technical authorities and mentor analysts from all TechSIGINT disciplines. Security Clearance Requirements:...
Francis King Carey School of Law - Instruction....
Amentum is seeking a Target Digital Network Analyst to conduct advanced analysis of collection and open-source data to ensure target continuity, to profile targets and their activities, and develop techniques to gain more target information. ...
As a Staff Analyst at Boeing Intelligence & Analytics you will be responsible for providing administrative support for leads and staff members, in a fast-paced, dynamic environment. Every day, Boeing Intelligence & Analytics supports global missions by building and delivering intelligence, analytics...
S government Top Secret security clearance with SCI eligibility and a polygraph (TS/SCI w/ polygraph). ...
As a cyber security professional at Lockheed Martin, you’ll protect the networks that our citizens and the world depend upon each minute. Here, you’ll work with cybersecurity experts on the forefront of threat protection and proactive prevention. In this important role, the Financial Analyst will:. ...
At ManTech International Corporation, you’ll help protect our national security while working on innovative projects that offer opportunities for advancement. Cryptographic Vulnerability Analyst. Cybersecurity Analysis and Cryptographic Engineering technical expertise. Identify vulnerabilities and c...
CACI is seeking mission focused Korean Cryptologic Language Analysts to join a team of dynamic Intelligence Community professionals supporting National Security objectives!. Korean Operational Language Analyst. ...
Bachelor’s Degree plus 11 years of relevant experience or Master’s degree plus 9 years of relevant experience or Doctoral degree plus 7 years of relevant experience; OR a high school diploma/GED plus 12 years of relevant experience or Associate’s degree plus 10 years of relevant experience and have ...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. The talent and skillsets of L211 SME’s deliver unique and mission-critical procurement expertise across six (6) of MITRE’s Federall...
CACI is seeking mission focused Farsi Cryptologic Language Analysts to join a team of dynamic Intelligence Community professionals supporting National Security objectives!. Farsi Operational Language Analyst. ...
S government Top Secret security clearance with SCI eligibility and a polygraph (TS/SCI w/ polygraph). ...
Program Controls Analyst - TS/SCI. ...
Peraton is seeking Protocol Analyst, Mid to support an Intel Community (IC) mission in Ft. Relevant experience must be in signals analysis, including protocol analysis, and also include network troubleshooting, network traffic characterization, and/or network security analysis. Active TS SCI securit...
Compass Point is looking for an Operations Analyst II to work at Fort Meade, MD. Compass Point Federal (Compass Point) is hiring an Operations Analyst III with experience and expertise in DoD and DISA contract requirements. ...
Provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Provide enterprise-wide cybersecurity, threat anal...
Author, complete and maintain the System Security Plan (SSP), Security Controls and plan of action and milestones (POA&Ms) within eMASS. Assist with the assessment of Assured Compliance Assessment Solution (ACAS) scans & Security Technical Implementation Guides (STIGs). Assist in the development and...
Research Data Analyst & Security Engineer. Job Posting Title (Working Title):Research Data Analyst & Security Engineer. Develop software engineering infrastructure for active research projects, particularly cybersecurity. Knowledge of cybersecurity principles and common cyberattacks (DDoS, Cross-Sit...
U) Information Technology (IT) and Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. In addition, it may also include engineering hardware and/or software, programming, computer/network ...
General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security). WarCollar is seeking Computer Network Defense Analysts (CNDAs) of all skill levels for a variety of roles to su...
This position will work within Cybersecurity environment monitoring, analyzing, and responding to Cybersecurity events and incidents not limited to; Analysis of Security Ops, ACAS, ESS (HBSS), and security related activities to secure and harden systems. Utilize available resources to conduct Cybers...
Provide holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the DODIN to include but not limited to Cloud, network boundaries, cross domains, and varying endpoint technologies. Provide enterprise-wide cybersecurity, threat anal...
Assess potential risks and make recommendations on the suitability of individuals for security clearances or access to secure facilities. Takes direction from the Personnel Security Manager III. Personnel Security Management (PSM) Certification, Certified Protection Officer (CPO). ...