...Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required... ...replacing cryptologic networks, physical security systems, electronic equipment, antennas,... .... Those seeking a Cryptologic Technician position must be U.S. citizens who can meet...
Suggested
Full time
Work experience placement
Worldwide
Overseas
...Support cyber exercise design and planning activities to meet FLTCYBERCOM training objectives; participate in Joint Event Life Cycle (JELC) events to include planning conferences/events, Master Scenario Events List (MSEL) Synchronization and Development conferences, and...
Suggested
Full time
...missions of key government sponsors. The Cyber System Assessments Group performs... ...to the success of their missions.
Position Description
When you join our team... ...contributing to the development of cyber security tools and techniques. You'll be reverse engineering...
Suggested
...Summary
Newberry Group's Public Sector Division is seeking a Cyber Data Analyst with expertise in analyzing status data from a variety... ...and recommend most appropriate hosting environment/platform, secure system architecture and design (or modification of existing) and...
Suggested
Holiday work
Full time
Temporary work
Interim role
Remote job
Flexible hours
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Suggested
Full time
Temporary work
Bank staff
Local area
Immediate start
Flexible hours
...support to government customers at Ft. Meade, MD.
Serve as the cyber countermeasure Subject Matter Expert for a new cyber capability... ...and command-and-control
· Understands how to use cyber security tools and data to conduct defensive cyber operations
· Understands...
Suggested
Full time
Worldwide
...engineer to join our dedicated team, supporting the Persistent Cyber Training Environment (PCTE) platform. This role demands an individual... ...categorized under Unclassified, Sec/REL, and Top-Secret security levels.
~ Bachelor's degree in a technical discipline such as...
Suggested
Full time
Remote job
Shift work
Weekend work
· Provides expertise and direction in the development and/or modification of computer-based scientific, technical, and business software systems. · Uses expertise to design develop, code, test, and debug software.
· May work in one or several areas, such as equipment ...
Suggested
Full time
...The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of National Security, including guarding against compromise by foreign intelligence...
Suggested
For contractors
Casual work
Local area
Remote job
Flexible hours
Night shift
...Come and help defend the nation in cyberspace! In the Cyber Operations & Analysis Technology Group at MIT Lincoln Laboratory, we research challenging technical problems in cyber security, develop new technologies, and prototype first-of-a-kind systems. We have particular...
Suggested
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Suggested
Full time
Temporary work
For contractors
Bank staff
Local area
Immediate start
Flexible hours
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Suggested
Full time
Temporary work
For contractors
Bank staff
Local area
Immediate start
Flexible hours
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Suggested
Full time
Temporary work
Bank staff
Local area
Immediate start
Flexible hours
...Skills:
• Active TS/SCI w/ CI Poly
• Security + CE or DoD 8570 certification at IAT -... ...systems best practices.
• Global Industrial Cyber Security Professional (GICSP), ISA... ...with hands and arms; talk and hear. Most positions require ability to work on desktop or...
Suggested
Holiday work
Full time
Contract work
Temporary work
Local area
Remote job
Flexible hours
...cybersecurity solutions company that provides high-end network and security consulting to Department of Defense and Intelligence Community... ...HAVE AN ACTIVE TS/SCI WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
Job Description:
The Information Systems Security...
Suggested
Local area
...The Cyber System Assessments Group performs software and hardware reverse engineering... ...hand-on training sessions. Our field site positions in particular offer an opportunity to... ...possess a current Top-Secret SCI level DoD security clearance. Preference will be given to...
Description::
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards and and recommend...
Holiday work
Full time
Temporary work
Bank staff
Local area
Immediate start
Flexible hours
...The selected candidate will perform security scans to identify vulnerabilities and risks, and work with the Engineering team to mitigate the risks. The candidate is required to have experience with ensuring systems successfully complete the Assessments & Authorization...
Full time
...cybersecurity solutions
company that provides high-end network and security consulting to Department of Defense and Intelligence... ...AN ACTIVE TS/SCI WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
The Information Systems Security Engineer shall perform,...
Local area
Remote job
ABOUT Effective, secure communication in the cyber domain is essential to the everyday operations of military intelligence in America’s Navy. Information... ...Those pursuing an Information Professional Officer position are required to attend Officer Candidate School (OCS) in...
Full time
Work experience placement
Internship
Worldwide
...talent and invites applications for various positions. Below are some of the roles we are... ...SOC Analyst I
DFIR Technician
Cyber Threat Intelligence Analyst
Threat Hunt... ...ensure information and information systems security. Responsibilities extend to maintaining...
Full time
...company that provides high-end network and security consulting to Department of Defense and... ...WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
Software Engineer 3
TKO is seeking a... ...CIT) TTO which provides normalization of cyber security data and automation of threat intelligence...
Local area
...company that provides high-end network and security consulting to Department of Defense and... ...WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
Job Description:
Performs installation... ...Security+ CE
GIAC Global Industrial Cyber Security Professional (GICSP)
GIAC Security...
Full time
Contract work
Local area
Immediate start
...company that provides high-end network and security consulting to Department of Defense and... ...WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
Job Description:
TKO is seeking a... ...DTS) TTO which provides normalization of cyber security data and automation of threat...
Local area
...system level to individual software components.
~ Full Stack Software Developer, which provides normalization of cyber security data. This position is part of an operations support team responsible for dataflow implementation including transitions from legacy to modern...
Full time
...company that provides high-end network and security consulting to Department of Defense and... ...WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
Job Description:
Applies systems... ...environment.
• Have experience with Cyber Security Directorate and related data flows...
Local area
...Command - US Space Force, as well as the National Security Agency, DISA/JFH DODIN Combatant Command - U.S. Space Force, U.S. Cyber Command - the National Security Agency,... ...use; recognizes when different scans, positions or angulations are needed to better illustrate...
Full time
Internship
Immediate start
Shift work
...company that provides high-end network and security consulting to Department of Defense and... ...WITH POLYGRAPH TO BE CONSIDERED FOR THE POSITION.
System Administrator Skill Level - 3... ...computer systems, including coordination with Cyber Systems Engineers.
Interacts with...
Local area
Remote job
...This position is located at Kimbrough Ambulatory Care Center
Fort Meade is the Army's second... ...Command - US Space Force, as well as the National Security Agency, DISA/JFH DODIN Combatant Command - U.S. Space Force, U.S. Cyber Command - the National Security Agency,...
Full time
Traineeship
Relocation
...collection gaps that can be satisfied through cyber collection and/or preparation activities.... ...Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance... ...that is clearly related to the position: an Associate’s degree plus 7 years of relevant...
Full time
Remote job