- UIC Government Services and the Bowhead Family of Companies (Quantico, VA)
- …architecture + Quality of Service (QoS) and Quality of Experience (QoE) management + Security and compliance for unified communications systems ... VA. Support for the contract will consist of program management ; logistics; asset management ; engineering; customer service;...Must be able to twist, bend, and squat periodically SECURITY CLEARANCE REQUIRED:Must currently hold a security … more
- CGI Technologies and Solutions, Inc. (Reston, VA)
- …and help shape the future of our application infrastructure. A strong background in Identity and Access Management (IAM), cloud services, and technical ... abilities and critical thinking skills. * Prior experience with Identity and Access Management (IAM)...dependent upon specific assignment and/or level of US government security clearance held. Dependent upon role and/or federal government… more
- Microsoft Corporation (Reston, VA)
- …on that new capacity and manage its lifecycle. You can support both the national security mission of the US government as well as demands of the burgeoning public ... architect at a global scale, and drive the national security mission of the US government. This opportunity allows...have an **active** US Government Top Secret Clearance with access to Sensitive Compartmented Information (SCI) based on a… more
- Integrated Security Technologies (Roanoke, VA)
- …With offices throughout the United States, we are a premier cyber and physical security specialty contractor, and we are growing at a rapid pace. We have a ... and are recognized leaders in the physical and IT security , cyber, and managed services industries. UT offers a...record and report any incidents or near misses to management immediately. + Attend any product or safety training… more
- Fannie Mae (Reston, VA)
- …and services. We conduct audits focused on highly visible topics, such as cyber security , IT Governance, resiliency, and the management of the various operating ... Here, you will grow your career and help create access toaffordable housing finance. Job Description Our team of...2 years of experience in IT Audit, IT Risk Management , or Information Security * Bachelor's Degree… more
- Datavant (Richmond, VA)
- …users + Identify root causes for recurring issues and recommend permanent solutions User Access & Role Management + Implement and maintain role-based access ... resolve system pain points and clarify requirements + Manage user roles, permissions, and access controls in coordination with IT Security + Build and maintain… more
- Curtiss-Wright Corporation (Ashburn, VA)
- … security screening. In the event information provided during the security screening reveals ineligibility to access export-controlled information, any offer ... You'll be part of a team driving innovation, ensuring national security , and delivering critical technologies with excellence and integrity. **Key… more
- L3Harris (Lynchburg, VA)
- …government security investigation(s) and must meet eligibility requirements for access to classified information. By submitting your resume for this position, ... sea and cyber domains in the interest of national security . Job Title: Lead, Program Manager - Land Mobile...within scope, schedule, and budget. Essential Functions: + Scope Management : Ability to interpret contracts and maintain the scope… more
- Grant Thornton (Arlington, VA)
- …with clients to design and implement proactive defense mechanisms, leveraging Microsoft's security ecosystem to protect against evolving cyber threats. From day one, ... Deliver Microsoft Threat Protection solutions, including: + Microsoft Defender for Endpoint, Identity , Office 365, and Cloud Apps + Microsoft Sentinel (SIEM/SOAR) +… more
- BOOZ, ALLEN & HAMILTON, INC. (Arlington, VA)
- …deploying and maintaining applications, appliances, or machines aligned to DoD Security Technical Implementation Guidelines (STIG) and Security Requirements ... (PKI) + Knowledge of cybersecurity concepts, including threats, vulnerabilities, security operations, encryption, boundary defense, auditing, authentication, and supply… more