Do you have an existing security clearance and acquisition experience with United States Intelligence Community as a Contracting Officer Representative, Project Leader or Contracting? Would you like to join a team that helps the Intelligence Community implement acquisition solutions to their most ch...
The IT Security IR Analyst support the Security Operations Control Center. IT Security (Incident Response). Responsible for Tier security configuration hardening, incident detection. Monitors security events to identify anomalies and possible incidents. ...
Lockheed Martin’s Missiles and Fire Control (MFC) business, the leading provider and pioneer for exceptional weapon systems, sensors and services is seeking a Classified Cyber Security Analyst / Information System Security Officer (ISSO) to join the security team in Orlando, FL. Acting as a liaison ...
Primarily responsible for API application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management). Hands-on experience performing application API security assessment, static and dynamic security assessme...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
The IT Security General Analyst support the Security Operations Control. IT Security (General Analyst). Information Security Operations Center analyst experience. Responsible for Tier security configuration hardening, incident detection/. ...
Are you a Security Operations Center Analyst who is looking to join one of the top companies in the Aerospace and Defense industry?. Information Security Operations Center analyst experience. Responsible for cybersecurity threat intelligence data collection via open intelligence sources. CompTIA Sec...
The Security Analyst I is a key contributor in the development, implementation, and monitoring of a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality, and availability of information that is owned, controlled, or processed by IPG. Collabor...
Complete an information system security course of instruction appropriate to level of responsibilities. Familiar with information system security architectural documentation standards. Able to apply information assurance / cyber security standards, directives, guidance and policies to an architectur...
As a prospective employee of Nightwing, you’ll have the chance to contribute to our continued success and shape the future of our cybersecurity, intelligence, and services offerings. About Cybersecurity, Intelligence and Services. The Cybersecurity, Intelligence and Services (CIS) business provides ...
A Senior Principal Cyber Engineer supporting Nightwing CODEX will be responsible for analyzing, understanding, designing, developing, and testing the worlds most advanced cyber security capabilities, supporting both offensive and defensive missions. As a Senior Principal Cyber Engineer supporting th...
Develop proposal documentation Systems Engineer, Security, Network Security, Systems, Engineer, Information, Technology. Lead Security Systems Engineering efforts on new business pursuits responsible for developing network security architecture, selecting new network security products, and developin...
Applies current systems security engineering methods, practices and technologies to the architecture, design, development, evaluation and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that the security protection needs, concerns an...
Applies basic knowledge of compliance, business, analytical, and communication skills to support compliance programs and processes that promote compliant and ethical behavior, meet regulatory obligations, and prevent, detect, and mitigate compliance risks. This position will focus on compliance with...
Java full-stack developers, Python/Java developers, Data analysts/ Data Scientists, and Machine Learning engineers. ...
AWS, CI/CD, Cloudflare, DevOps, Engineer, Linux, Security. You will handle metal hardware, cloud instances, containers, sandboxes, networking, VPNs, storage, databases, caches, websites, monitoring, logging, backups, ETL, security of web services, CI builds, documentation, etc. Development of contin...
L3Harris is currently seeking a Security / Vulnerability Research Engineer to join our team. This is an extremely exciting position working with National Security customers to protect and defend our nation. L3Harris Technologies is seeking the best of the best to support our Security Vulnerability a...
Our work depends on Security Officer joining our team, The Launch Security Operations Specialist (LSOS), provides overall security operations support for all Launch-related activities, to include SV transportation and processing, SV/LV integration, launch base operations, monitoring and operation of...
The Information Security System Engineers (ISSE) reside in the Security. Information Security Systems Engineer (General ISSE). Act as primary engineering support to network security operations for the. Supervise the technical work of junior security engineers to perform. ...
Lead Security Systems Engineering efforts on new business pursuits responsible for developing architecture, selecting new products, and developing cost estimates to implement solutions. Develop, maintain, and publish network security technical documentation in accordance with client's Systems Engine...
We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accurately processing submissions sent electronically by our members.A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy a...
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at. Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Ensuring all appl...
Define requirements modeling standards to include definition of business needs, how and when to reuse functional requirements, and business scope of non-functional requirements. Use exceptional knowledge of business analysis to create compelling presentations and influences business leaders to make ...
Evaluate new networking and network security technologies as they evolve and recommend performance-enhancing as well as security-enhancing network equipment. Field experience should encompass enterprise network technologies (CISCO) support, applied network security engineering, knowledge of disaster...
The Virtus CLO Compliance/Analytics Team handles the financial modeling, reviewing, and stress testing compliance models for collateralized loan obligations (CLOs) and similar transactions. The Senior CLO Compliance Analyst is responsible for ensuring models are developed, reviewed, and tested in ac...