Average salary: $84,000 /yearly
More statsGet new jobs by email
- ...and remote penetration testing designed to emulate current threat models to the Army network to execute an assessment of the defensive... ...vulnerability assessment scan of the site to execute an analysis of this data to identify potential targets (systems and/or vulnerabilities)...DataFor contractorsCivilian ContractorLocal areaImmediate startRemote work
- ...operational portals that are accessed IAW with Role Based Access Control models. Install, maintain, deploy, manage, and harden DBMSs.... ...Have and maintain a Secret Clearance ~ Experience performing data analysis ~ Experience with data pipelines Peraton Overview...DataShift work
$66k - $106k
...Agreement (MOU/A), Service Level Agreements (SLA). • Threat and Data Analysis. Perform the following threat and data analysis... ..., and methodologies of malicious cyber activities to attribute, model and predict future intrusions. • Analyze computer network intrusion...DataFor contractorsInternshipFlexible hoursRotating shiftWeekend work- ...Responsibilities & Qualifications** **RESPONSIBILITIES** + Analyzes data from multiple disparate sources to provide cybersecurity and... ...processes, and layouts for complex, enterprise-scale data sets used for modeling, data mining, and research purposes. + Guides preparation of the...DataFull timeContract workTemporary workWork at officeWeekend workDay shiftAfternoon shiftMonday to Friday
- ...vulnerability assessments and monitor networks to support test and operational environment requirements. ~ Solid understanding of data transport, encryption, networking, IT systems, and cybersecurity fundamentals Peraton Overview Peraton is a next-generation...Data
- ...technologies. **Responsibilities** + This individual researches, analyzes, develops, designs, models, and tests communications systems and equipment, including but not limited to data links, digital radio, battle management and command and control systems, point‐to-point...DataContract workFor contractorsWork at officeLocal areaRemote work
- ...personnel in conducting initial triage/cyber incident analysis to include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response actions. Immediate response actions can include submission of a cyber-...DataFor contractorsLocal areaImmediate startShift work
- ...procedures. • Coordinate and synchronize Incident Handling (IH) actions or cyber incidents with LE/CI per TTP. • Acquire any necessary data to determine scope of reported cyber incidents and ensure all investigation reports are automatically forwarded to ticketing...DataWorldwide
- ...and remote penetration testing designed to emulate current threat models to the Army network to execute an assessment of the defensive... ...+ Five (5) years of applicable experience working with various data (network and system) technologies, with a minimum of two (2) of...DataContract workWork at officeLocal areaRemote workNight shift
- ...vulnerabilities. Analyzes the security of new or existing computer applications, software, and hardware, delivering actionable results. Analyzes data collected from various cybersecurity defense tools to mitigate risks. + Develops and integrates, testing, operations, and...DataFull timeContract workTemporary workWork at officeLocal areaWeekend workDay shiftAfternoon shiftMonday to Friday
- ...reporting, and briefing skills. Ability to interpret financial data and deliver actionable insights. Requirements: Minimum... ...standards. Proficiency in Microsoft Excel, PowerPoint, and financial modeling tools. U.S. Citizenship required. Security Requirement :...DataContract workWork at officeLocal area
- ...creation and publication of technical documentations and manuals. You will support NETCOM in collection and interpretation of technical data or information and coordination of layouts for publication to Army Enterprise programs at various life cycle stages. We are looking...DataFull timeContract workTemporary workImmediate startWorldwideFlexible hours
- **Req ID:** RQ203018 **Type of Requisition:** Regular **Clearance Level Must Be Able to Obtain:** Secret **Public Trust/Other Required:** None **Job Family:** Cyber Security **Skills:** Cybersecurity,Enterprise Mission Assurance Support Service (eMASS),Security Controls...SuggestedTemporary workWork at officeImmediate startWorldwideFlexible hours
- Tactical Data Link Test Engineer/Analyst Sierra Vista, AZ Join our Talent Network Overview Tactical Data Link Test Engineer/Analyst Ft. Huachuca, AZ Are you ready to enhance your skills and build your career in a rapidly evolving business climate? Are you looking...DataContract workTemporary workWork at office
- ...challenges in patient care, quality and compliance requirements, workforce retention, and operational efficiencies, we deliver strategic, data-driven solutions that include redefining workforce management and clinical service delivery. Explore InGenesis to discover how our...DataLocal areaShift work
- ...propulsion, and avionics subsystems. • Conduct simulations and modeling to optimize vehicle performance, aerodynamics, and orbital... ...fabrication, and testing in both lab and field environments. • Perform data analysis from tests and missions to drive design improvements...DataPermanent employment
- ...Architecture (HLA) and Distributed Interactive Simulations Protocol Data Unit (DIS PDU) protocols and functionality. + Extensive... ...expansive view of what's possible to every engagement. Our delivery model and unique approaches harness our deep technical and domain knowledge...DataContract workWork experience placement
- ...and recommendations for corrective action. Apply scientific, statistical, and economic principles to support decision-making and model operational impacts. Utilize advanced methods such as linear programming, game theory, and probability to evaluate cyber risk....For contractorsLocal area
- ...Network Engineer Advisor will make an impact:** **Responsible for the design and development of voice, video, radio frequency, and/or data communications networks.** **Provide detailed activity reports of weekly work in collaboration with your team.** **Provide planning,...DataTemporary workImmediate startRemote workWorldwideFlexible hours
- ...include, review correlated events, system/device logs, and SIEM event data to determine and recommend/take immediate DCO-IDM response... ...and remote penetration testing designed to emulate current threat models to the Army network to execute an assessment of the defensive...DataLocal areaImmediate startRemote work
- ...Requirements Validation Board (CRVB) requirements, Training Resource Model (TRM), and the five-year Program Operating Management (POM), and... ...) via a Software License List. Validate licenses and respond to data calls/other information-gathering efforts regarding a given...DataContract workFor contractors
- ...in developing and maintaining the processes to move and ingest data into and from all DCGS-A Family of Systems components to support... ...expansive view of what's possible to every engagement. Our delivery model and unique approaches harness our deep technical and domain...DataContract workWork experience placement
- ...operation focuses on the operation of the IP networks that provide data transport for the DoDIN-A and local area network (LAN) internal... ...defined, or physical based on system owner deployment. • Model-Driven DevOps for Scaled Brownfield Network Automation. Engagement...DataFor contractorsLocal area
- ...control to protect GCC CONUS managed DODIN-A services (NIPRNet and SIPRNet). • The Web Hosting service provides custom web-based, data driven applications in both SharePoint and Java in support of the GCC mission. The team implements the Software Development Lifecycle...DataFor contractors
- ...upon hire, required within three months of hiring date. Experience / Skills: + 5 years applicable experience working with various data (network and system) technologies, with a minimum of two of those years focused on information systems security, forensic and...DataContract workWork at officeNight shift
- ..., as applicable to the task, in one or more of the following areas: ~ Communications Command and Control. ~ Data and information processing. ~ Modeling and simulation. ~ Information assurance and operations. ~ Network and system management. Background in...DataContract workTemporary workPart timeFor contractorsLocal areaImmediate start
- ...detect, analyze, and correlate events for potential threat activity utilizing Security Information Event Management (SIEM) systems, Big Data Analytics, and other supporting platforms or applications. + Lead exploratory and in-depth analysis of network traffic from...DataContract workWork at officeNight shift
- ...Manager with the program database used for reporting to the government. Produces necessary queries and report, assists in normalizing data, ensures data integrity. + Assists the staff and Leads with maintenance of reports and documents stored on a government SharePoint...DataContract workWork at office
- ...fully documented including service alignment, IP address, location, model, LCM contract, and serial number. Physical/logical diagrams and... ...to improve the efficiency of operations for the GCC. • Data Management. Define and implement an approved Data Management Plan...DataContract work
- ...cardiovascular procedures in the cardiac catheterization lab. This role involves preparing patients and equipment, monitoring hemodynamic data, assisting physicians during procedures, and ensuring patient safety throughout the process. The technologist operates specialized...DataWeekly payTemporary workImmediate startShift work