- GovCIO (Tallahassee, FL)
- …**Responsibilities** In this role you will support the Defense Counterintelligence Security Agency (DCSA), Background Information Systems (BIS), Case Processing ... and other background investigation systems. The successful candidate will support requirements elicitation, analysis, development, testing, and application level operational support for mission critical applications providing background investigation… more
- CAE USA INC (Tampa, FL)
- …+ Accomplishes required internal security self-inspections and Defense Counterintelligence and Security Agency (DCSA)/Customer Security Assessments. + Other ... security duties as assigned. Qualifications and Education Requirements + B achelor's degree in related discipline or equivalent Industrial Security work experience . + Demonstrated knowledge of the 32 CFR Part 117/ the National Industrial Security Program… more
- General Dynamics Information Technology (Tampa, FL)
- …spectrum of operational and administrative intelligence products, including Counterintelligence Reviews, Damage Assessments, Production Reviews, Lead Generation ... Packets, Intelligence Support Packets, and Targeting Packets. Ensure the timeliness, responsiveness, accuracy, and effectiveness of operational and intelligence reporting. + Proficient in using Microsoft Office Suite Applications and Adobe Acrobat to support… more
- Leidos (Tampa, FL)
- …Experience at the CCMD or Joint Staff level + Familiarity with HUMINT or Counterintelligence integration EIO2024 Come break things (in a good way). Then build them ... smarter. We're the tech company everyone calls when things get weird. We don't wear capes (they're a safety hazard), but we do solve high-stakes problems with code, caffeine, and a healthy disregard for "how it's always been done." **Original Posting:** July… more
- GovCIO (Tallahassee, FL)
- …**Responsibilities** In this role you will support the Defense Counterintelligence Security Agency (DCSA), Background Information Systems (BIS), Case Processing ... and other background investigation systems. The successful candidate will support requirements elicitation, analysis, development, testing, and application level operational support for mission critical applications providing background investigation… more
- DarkStar Intelligence LLC (Tampa, FL)
- …to security protocols. Minimum Qualifications + Current Top Secret/SCI + Current Counterintelligence Polygraph + Meets all qualifications & skills of a mid-level ... collection manager, with demonstrated leadership. + Minimum 12 years of relevant experience, with at least some experience within the last 2 years. Desired Education: + Master's degree in a related field from an accredited institution, or a Bachelor's degree… more
- DarkStar Intelligence LLC (Tampa, FL)
- …intelligence requirements. Minimum Qualifications + Current Top Secret/SCI + Current Counterintelligence Polygraph + Meets all qualifications & skills of a Mid-level ... analyst, plus extensive senior-level expertise. + Desired Experience: Minimum 12 years of relevant experience, with at least some experience within the last 2 years. + Desired Education: Master's degree in a related field from an accredited institution, or a… more
- Shuvel Digital (Pensacola, FL)
- …working in one of the following highly desired: * DOD/FED Cyber Client organization * DCIO/MCIO, with Cyber Counterintelligence focus Education: Bachelor's required ... Job Description: The Deputy Cyber Incident Response Team (CIRT) Manager ensures exceptional service for managed services customers and helps drive employee engagement for CIRT staff members. They will help coordinate the daily activities of CIRT staff; orient,… more
- Cipher Tech Solutions (Tampa, FL)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more
- Cipher Tech Solutions (Tampa, FL)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: * How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more