Search Results: 139 vacancies
...of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required) - and potentially... ...troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers,...
Suggested
Full time
Work experience placement
Worldwide
Overseas
...Group's Public Sector Division is seeking a Cyber Data Analyst with expertise in analyzing... ...clearance or above.
Location
Remote role; however, must live within commuting... ...appropriate hosting environment/platform, secure system architecture and design (or modification...
Remote job
Holiday work
Full time
Temporary work
Interim role
Flexible hours
...The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission... ...Security Services Department encourages flexible schedules and hybrid remote work arrangements.
Who are we?
MIT Lincoln Laboratory is a...
Remote job
For contractors
Casual work
Local area
Flexible hours
Night shift
...support to government customers at Ft. Meade, MD.
Serve as the cyber countermeasure Subject Matter Expert for a new cyber capability... ...and command-and-control
· Understands how to use cyber security tools and data to conduct defensive cyber operations
· Understands...
Suggested
Full time
Worldwide
...engineer to join our dedicated team, supporting the Persistent Cyber Training Environment (PCTE) platform. This role demands an individual... ...categorized under Unclassified, Sec/REL, and Top-Secret security levels.
~ Bachelor's degree in a technical discipline such as...
Remote job
Full time
Shift work
Weekend work
Make money from home! Earn extra cash by taking paid online surveys.
Remote job
Second job
...Come and help defend the nation in cyberspace! In the Cyber Operations & Analysis Technology Group at MIT Lincoln Laboratory, we research challenging technical problems in cyber security, develop new technologies, and prototype first-of-a-kind systems. We have particular...
Suggested
· Provides expertise and direction in the development and/or modification of computer-based scientific, technical, and business software systems. · Uses expertise to design develop, code, test, and debug software.
· May work in one or several areas, such as equipment ...
Suggested
Full time
...The Cyber System Assessments Group performs software and hardware reverse engineering, vulnerability research and discovery, and... ...investigation and must possess a current Top-Secret SCI level DoD security clearance. Preference will be given to candidates with a completed...
Suggested
...industrial environments with limited telecommute/remote options possible.
• Manage project... ...Skills:
• Active TS/SCI w/ CI Poly
• Security + CE or DoD 8570 certification at IAT -... ...best practices.
• Global Industrial Cyber Security Professional (GICSP), ISA Certified...
Remote job
Holiday work
Full time
Contract work
Temporary work
Local area
Flexible hours
...enhance the existing Splunk infrastructure in the enterprise. Further projects will involve the implementation of Splunk Enterprise Security (ES) and Security Orchestration, Automation, and Response (SOAR) and other vendor solutions.
Implements, tests, and operates...
Suggested
Full time
Night shift
...motivated and entrepreneurial-minded individuals for the role of Remote Cruise Coordinator. This position offers the opportunity to work... ...as Expedia, Golden Tickets, Norwegian Air, Hertz, and others to secure favorable deals for clients.
# Client Communication:...
Remote job
Full time
Part time
Flexible hours
...Information Systems Security Engineer Level 3 woodcons.com
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information...
Suggested
Full time
...Information Systems Security Engineer Level 2 woodcons.com
The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information...
Suggested
Full time
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Suggested
Full time
Temporary work
Bank staff
Local area
Immediate start
Flexible hours
...The selected candidate will perform security scans to identify vulnerabilities and risks, and work with the Engineering team to mitigate the risks. The candidate is required to have experience with ensuring systems successfully complete the Assessments & Authorization...
Full time
...Stratum Networks is a rapidly growing information assurance and cybersecurity solutions company that provides high-end network and security consulting to Department of Defense and Intelligence Community clients. We are looking for a talented and passionate ISSO III who...
For contractors
Local area
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Full time
Temporary work
For contractors
Bank staff
Immediate start
Flexible hours
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Full time
Temporary work
For contractors
Bank staff
Immediate start
Flexible hours
...the ability of federal government customers to preserve national security, deliver justice and serve the public with advanced... ...with the latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
Full time
Temporary work
Bank staff
Immediate start
Flexible hours