Average salary: $66,263 /yearly
More stats ...motivated, career, and customer-oriented Information System Security Engineer to join our team in the Hanscom Air Force Base area.... ...Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and protection...
Suggested
Holiday work
...seeking energetic, enthusiastic, and dynamic individuals with excellent customer service skills to join our winning team of Unarmed Security Guards.
Windwalker offers excellent pay, benefits, and advancement opportunities for motivated and dedicated guards. The...
Suggested
Flexible hours
All shifts
Job Description
Job Description Security Guard Supervisor
Suggested
...Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Program Security Representative I.
Job Descriptio n:
Summary: The Program Security Representative’s primary function is to provide multi-...
Suggested
Temporary work
For contractors
...Solutions, Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Activity Security Representative III.
Job Description:
Summary: The Activity Security Representative III’s primary function is to provide...
Suggested
Temporary work
For contractors
...The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of National Security, including guarding against compromise by foreign intelligence...
Suggested
For contractors
Work experience placement
Casual work
Local area
Remote job
Flexible hours
Night shift
...The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of National Security, including guarding against compromise by foreign intelligence...
Suggested
Casual work
Remote job
Flexible hours
...Position Description
The Cyber Security Vulnerability Management Team Lead will provide leadership and direction in the day-to-day management of the vulnerability assessment, tracking, and remediation efforts to the Laboratory Cyber Security Vulnerability Management...
Suggested
Work alone
...Inc. (GRS) is seeking an enthusiastic, motivated, detail orientated, and talented individual for the position of Information System Security Manager II.
Job Descriptio n:
Summary: The ISSM II’s primary function is working within Special Access Programs (SAPs)...
Suggested
Temporary work
Local area
...motivated, career, and customer-oriented Information System Security Officer to join our team at the Hanscom Air Force Base. The person... ...Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities, risks, and...
Suggested
Holiday work
...Corporation (gTC), is a S corporation and a registered Government contractor that provides services and solutions in:
National Security Programs
Professional, Administrative, and Management Support
Mission and Warfighter Support
We are a Service Disabled...
Suggested
For contractors
Local area
Flexible hours
...in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.
#127758; SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every...
Suggested
Hourly pay
Contract work
For contractors
Work experience placement
Local area
...in 2007, we are proud to be a Service-Disabled Veteran Owned Small Business.
#127758; SUBJECT MATTER EXPERTS specializing in security and risk management. We’re intimately familiar with DOD security programs and mission requirements.
⭐ OUR CORE VALUES drive every...
Suggested
Hourly pay
Contract work
For contractors
Work experience placement
...Corporation (gTC), is a S corporation and a registered Government contractor that provides services and solutions in:
National Security Programs
Professional, Administrative, and Management Support
Mission and Warfighter Support
We are a Service Disabled...
Suggested
For contractors
Flexible hours
...Position Description
The Security Analyst II is a member of the Threat Assessment Team – which performs analysis on cyberthreats, research and develop new methods for detecting cyber threats, reviews and triages security alerts, and other suspicious system or network...
Suggested
...Corporation (gTC), is a S corporation and a registered Government contractor that provides services and solutions in:
National Security Programs
Professional, Administrative, and Management Support
Mission and Warfighter Support
We are a Service Disabled...
For contractors
Flexible hours
...The Security Services Department’s overall mission is to identify and counter security threats to the MIT Lincoln Laboratory’s mission of development of game-changing technology in support of National Security, including guarding against compromise by foreign intelligence...
Casual work
Remote job
Flexible hours
...Job Description
JOB SPECS:
Job Title: Security Officer (Pharmaceutical Client)
Site Location: Lexington, MA (Free parking)
Starting Pay: $19.69/hour
Site Requirements: Must be Fully Vaccinated Against Covid-19, Driver's License...
Weekly pay
Worldwide
Flexible hours
Night shift
...where to apply your talents and ideas, where to grow and look for self-fulfillment.
The at Lincoln Laboratory is made up of security architects, software developers, hardware and electrical engineers, cryptographers, computer scientists, and systems analysts, who...
...choice where to work, where to apply your talents and ideas, where to grow and look for self-fulfillment.
We, the members of the Secure, Resilient Systems and Technology Group at MIT Lincoln Laboratory, have made our choice. We share a common passion for helping...
...where to apply your talents and ideas, where to grow and look for self-fulfillment.
The at Lincoln Laboratory is made up of security architects, software developers, hardware and electrical engineers, cryptographers, computer scientists, and systems analysts, who...
...to $68.73/hr
The ISSM’s primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department...
Local area
...Job Description
Job Description Salary: Up to $48.89 hourly
The Activity Security Representative’s primary function is to provide multi-disciplined security support to a customer’s facility and organization. The position will provide “day-to-day” support for Collateral...
Hourly pay
Holiday work
For contractors
Immediate start
Flexible hours
...Northeast Security is looking for Part Time and Full Time Mobile Patrol Security Officers in Lexington!
This is an overnight Mobile Patrol position between two properties in Lexington. We have Full Time and Part Time available:
Pay Rate:
$21.30
Days:...
Full time
Part time
Local area
Shift work
Night shift
Sunday
Saturday
...Job Description
Job Description Salary: Up to $54.58 hourly
The ISSO is responsible for ensuring the appropriate operational security posture is maintained for an information system and as such, works in close collaboration with the ISSM and ISO. The position...
Hourly pay
Holiday work
Immediate start
Flexible hours
...Job Description
Job Description Salary: Up to $55.35 hourly
The Program Security Representative’s primary function is to provide multi-discipline security support for one or more of the customer’s Special Access Programs (SAPs). The position will provide “day-to...
Hourly pay
Holiday work
For contractors
Immediate start
Flexible hours
...Our Cyber Security Team monitors and protects Laboratory research from IT threats. The team operates a security operation center which looks at network traffic to find and eliminate threats from malware, spear fishing, and other attacks against the Lab. The team also...
...Diagnose and perform repairs on faulty system/server hardware.
Install, update, and troubleshoot systems/servers.
Develop and... ...remediation.
Serve as a member of the Special Programs Information Security Incident Response
Team and assist with efforts in...
For contractors
For subcontractor
Remote job
...Description Summary: Seeking a DevOps Engineer to build, maintain, and secure production infrastructure for software development with... ...capabilities
Expertise in RHEL virtualization platforms installation and support
Container technology experience (Docker, Podman...
Hourly pay
Holiday work
Temporary work
For contractors
Local area
...position will be the successful deployment of software update and security controls as needed.
The successful candidate will be... ...staff / executives.
Perform troubleshooting of application install/update issues.
Demonstrate fundamentals of emotional intelligence...
Remote job
Contract work
Work experience placement