- Parsons Corporation (Fort Belvoir, VA)
- …transfers are implemented and functional. + Assist the Information System Security Manager with approved data transfer process and two-person integrity (TPI) policy ... Vulnerability Scanning & Management activities from the National Initiative for Cybersecurity Education (NICE) Framework. + Ability to perform multiple functions,… more
- KBR (Chantilly, VA)
- …KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security ... of engineering, logistics, operations, science, program management, mission IT and cybersecurity solutions. + Collaborative Environment: Be part of a dynamic team… more
- GovCIO (Fairfax, VA)
- …+ Build culture of security-first development and IT infrastructure + Deliver Cybersecurity and IA SOPs + Design enterprise wide security approach to Continuous ... + During the Interview Process + Virtual video interview conducted via video with the hiring manager and/or team + Camera must be on + A valid photo ID must be… more
- GovCIO (Fairfax, VA)
- …Build and deploy servers. Troubleshoot issues with the servers, network, or cybersecurity risks + Configure, deploy, and maintain Windows Server Update Services ... + During the Interview Process + Virtual video interview conducted via video with the hiring manager and/or team + Camera must be on + A valid photo ID must be… more
- M. C. Dean (Vienna, VA)
- …Virginia, MC Dean delivers resilient, secure, and innovative power and technology solutions through engineering expertise and smart systems integration. **Why Join ... the next generation of technical leaders in electrical, engineering, and cybersecurity industries. As the Company continues to expand aggressively both domestically… more
- Trace Systems Inc (Portsmouth, VA)
- …as Enterprise Mission Assurance Support Service (eMASS), Vulnerability Remediation Asset Manager (VRAM), Navy Continuous Monitoring and Risk Scoring (CMRS-N) and ... the mission critical procedures, systems, and processes, as they pertain to Information Technology and Cyber Security requirements. + Advise on the proper method to… more