- UIC Government Services and the Bowhead Family of Companies (Dahlgren, VA)
- …Linux system management skills are required. + Must meet DoD 8570 Cyber Security Workforce (CSWF) criteria of Information Assurance Technical (IAT) Level III ... Directive 8570.1 Information Assurance Technical Level II certification required (ie, Security + CE, GSEC, SSCP, or CCNA- Security ). + Familiarity with the… more
- BOOZ, ALLEN & HAMILTON, INC. (Reston, VA)
- …and problem-solving skills Clearance : Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access ... with SIEM, SOAR, EDR, and threat intel platforms to enrich detection and investigation workflows. C ond uct regular tuning of parsers, views, tags, and sessions… more
- Leidos (VA)
- …enhancements. + Implement and maintain data governance policies, including data quality, security , and retention. **Training and Documentation:** + Develop ... matter where they are. With a focus on excellence, security , and innovation, this is your chance to be...a deep understanding of Salesforce architecture, including Health Cloud, Data Cloud, Sales Cloud, Service Cloud, Marketing Cloud, and… more
- Datavant (Richmond, VA)
- …a case-by-case basis. For more information about how we collect and use your data , please review our Privacy Policy (https://www.datavant.com/privacy-policy) . ... Datavant is a data platform company and the world's leader in...will coordinate with cross-functional teams including Legal, Operations, and Security to support risk mitigation, training, and adherence to… more
- UIC Government Services and the Bowhead Family of Companies (Fort Belvoir, VA)
- …and warfighter mission accomplishment by ensuring real-time availability of command and logistics information & data . This is a fast paced job managing subject ... a Sr. Development of Operations Engineer for the upcomingArmy Data and Analytics Platform (ARDAP) effort located at Fort...products that meet the needs of the Army Training Information System (ATIS). + This role collaborates closely with… more
- M. C. Dean (Alexandria, VA)
- …trust. **Clearance Requirement:** Applicants selected will be subject to a government security investigation and must meet eligibility requirements, including US ... Citizenship, for access to classified information ; **Ability to obtain and maintain a Top-Secret/SCI Clearance.**...+ Applicants selected will be subject to a government security investigation and must meet eligibility requirements,… more
- Jensen Hughes Inc. (Fairfax, VA)
- …from accessibility consulting and risk analysis to process safety, forensic investigations , security risk consulting, emergency management, digital innovation ... recruitment process. Please click **here (https://www.jensenhughes.com/careers/responsible-use-of-ai-in-the-jensen-hughes-recruitment-process)** to review. The security of your personal data is important… more
- CACI International (Sterling, VA)
- Machine Learning Developer Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: None Employee Type: Regular Percentage of ... Development and hardware integration for the Department of Homeland Security (DHS). As a member of the ITI2.1 Team,...ITI2 .1border applications. The individual will manage and use data to train the predictive model, infer and recommend… more
- Ryder System (Richmond, VA)
- …in the claim handling processes. Supervise outside vendors retained for investigations , cost containment, expert witnesses, and litigation management to ensure ... Manager in the selection and management of outside vendors for investigation , cost containment, audit functions, expert witnesses, and litigation management… more
- Highmark Health (Richmond, VA)
- …of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies ... + Evaluates all verifications for possible discrepancies with practitioner information and the need for further investigation ....and Practices and Information Security Policy._ _Furthermore, it is every… more