Search Results: 41,725 vacancies
...Division over time.
~ Direct exposure and experience with Firewall management using tools like Cisco Adaptive Security Appliance (ASA) or Palo Alto Networks
~ Experience with use and or implementation of Cyber Physical System Tools like Nozomi or Dragos
~ Resource needs...
Suggested
...Job Description
Growing Cyber Security Services firm and 2023 Top Work Places to Work recipient... .../capture through delivery management/oversight.
The ideal candidate will... ...compliance, risk management, security operations, security engineering, Governance Risk...
Suggested
Remote job
For subcontractor
...We are seeking a Cyber Security Program Manager to join our team in support of an upcoming program with our federal client. In this position,... ...Privacy Compliance, etc.
~ Experience drafting Standard Operating Procedures (SOP), Plans of Action and Milestones (POA&Ms)...
Suggested
Full time
Contract work
Apprenticeship
Local area
$145k - $165k
...Cyber Security Innovations (CSI) is looking for a Cyber Security Project Manager to join our team on an upcoming program, pending contract award. The Project Manager will... ...Include:
Responsible for day-to-day operations of the project team.
Develop comprehensive...
Suggested
Full time
Contract work
Apprenticeship
Local area
The Technology Manager: Cyber Risk & Secure Configuration has a targeted focus in their oversight and active supervision for a Technology operational team(s) and most often reports directly to a Technology Manager or Director.
Essential Job Functions:
Develops and...
Suggested
Holiday work
Full time
Temporary work
For contractors
Work experience placement
For subcontractor
Local area
Immediate start
...throughout the workforce to ensure successful operations.To view this position's duties, click... ...~- U.S. Citizenship- Drug Test- Security Investigation
All applicants must... ...Defense Intelligence Agency Senior Executive Management Office (Attn: SEMO, DIAC, Ms. Miller)...
Suggested
Permanent employment
Full time
Temporary work
Part time
...Summary
Cyber Security Officers identify current threats, mitigate vulnerabilities, and anticipate... ..., protecting CIA data and systems and managing IT risk.
This job is open to... ...will ensure the development, deployment, operations, implementation and support of...
Suggested
Permanent employment
Full time
Temporary work
Part time
Work experience placement
Overseas
...Corporation is currently seeking a qualified Cyber Security Engineer (SIEM/SOAR) for Washington D.... ..., and security information and event management (SIEM). Some examples of the 20+... .... They will also support the Security Operations Center (SOC) for advanced SIEM queries...
Suggested
Contract work
Work experience placement
...meet the most complex U.S. defense, security, space, and intelligence... ...Summary:
Airbus US is looking for a Cyber Security Product Risk Manager to who works with specialists from... ...CNSSI-1253) and Development Security operations.
Extensive experience of RMF implementation...
Suggested
Full time
Contract work
Local area
...or solution issues and to shepherd research and piloting of new capabilities with project engineers and/or partner organization as required. Analyze, define, and document requirements fo Security Engineer, Architect, Security, Project Engineer, Cyber Defense, Engineer...
Suggested
...with remote work possible to provide technical expertise in the management of cybersecurity requirements of developmental and in-service... ...with experience aboard a U.S. Navy warship.
~ Secret Security Clearance required at time of hire with eligibility for Top Secret...
Suggested
Contract work
Local area
Remote job
...Position: Cyber Operations Planner III
Location: Arlington, VA
Clearance: TS/SCI
Work... ...to support the Department of Homeland Security, Cybersecurity and Infrastructure... ...scope of required planning and develop and manage working groups to ensure representation...
Suggested
Local area
...Job Description
Job Description Cyber Security Analyst
Position Summary:
IEM is... ...document findings and remediation plans
Manage remediation plans toward closure... ...controls for network, application designs, operating systems, endpoint protection, mobile...
Suggested
Holiday work
Full time
Local area
Flexible hours
Posting Title:
Cyber Security Analyst II
Overview:
Technology Services serves the University... ...and libraries, and by supporting the management information needs of the University.... ....
- Install security measures and operate software to protect systems and information...
Suggested
For contractors
Local area
...Cyber Security Incident Responder/ Information System Security Analyst
Location: Arlington, VA
Must have Top Secret Security Clearance... ...and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber...
Suggested
Holiday work
Permanent employment
Temporary work
Shift work
Night shift
...JCS Solutions LLC (JCS) is seeking a Cyber Security Analyst responsible for implementing,... ...ISSO) for maintaining the appropriate operational IA posture for a system, program, or enclave... ...IA documentation
Assist with the management of security aspects of the information...
Temporary work
Work experience placement
Sr Cyber Security Analyst
Job Category: Security
Time Type: Full time
Minimum Clearance Required to Start: Secret
Employee Type... ...activities for the Army Military Pay (AMP) Program . Manages major information security efforts of national significance....
Full time
Contract work
Work experience placement
Local area
...background in U.S. Government security standards and requirements.... ...involves collaborating with operational teams to ensure robust security... ...Provide Security Incident management support, actively participating... ...and infrastructure solutions, cyber security, digital modernization...
Temporary work
Local area
...Description
Job Description Job Title: Cyber Security Engineer
Location: Arlington or... ...(SoC, MCU, etc.) and low-level operating system components of consumer devices.... ...supports network defense, vulnerability management, and incident response based on our client...
Local area
...assessments of network and system security for intrusion detection,... ...access control, auditing, and log management. Uses technical expertise to... ...to obtain technical cyber threat intelligence. Research... ...**Department**
Security Operations Center
**Equal Employment Opportunity...
Remote job
Work experience placement
Immediate start