- Leidos (Odenton, MD)
- …the Internet protocol suite, data services, and associated ports used on DoD IS are registered, controlled, and regulated properly. This function supports enhancing ... data services in support of net-centric operations and ensures DoD operations interoperability of joint applications and the security...and FA reports + Manage PPSM phone and email systems (SIPRNet/NIPRNet) in accordance with SOPs. + Respond to… more
- Competitive Range Solutions, LLC (Fort Meade, MD)
- …as SIEM platforms, IDS/IPS systems , and endpoint detection solutions. + Certifications such as Security+, CEH, or other DoD -approved cybersecurity credentials. ... projects in a collaborative, congenial environment. We are seeking a SOC Analyst Level 1 to actively participate in security operations by proactively monitoring… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Requirements Experience to include but not limited to: + Coordinating network defense operations with DOD Component Commands/Services/Agencies/Field Activities ... with Poly Level of Experience: Entry Level This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare … more
- Belay Technologies (Hanover, MD)
- …a brand new contract! The EA have many of the same skills of Digital Network Exploitation Analyst (DNEA), but their primary mission is more focused on ... make operational adjustments. There are multiple levels available for the Digital Network Exploitation Analyst : + Exploitation Analysts Level 1 + Exploitation… more
- ManTech (Belcamp, MD)
- …from an accredited university + 10+ years of relevant management experiences as an analyst . + 5+ years of relevant DoD contracting experience. + Experience with ... **ManTech** seeks a motivated, career and customer-oriented **Management Analyst ** to join our team in the **Belcamp,...will work in support of the Army for the Network Modernization & Mission Network Technical Service… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …TS/SCI with Poly Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare ... Systems comprises cyber and mission IT; electronic warfare; and...cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- General Dynamics Information Technology (Bethesda, MD)
- …Citizenship Required:** Yes **Job Description:** Own your career as a Cyber Security Analyst Sr Advisor at GDIT. Here, you'll have the opportunity to build strong ... GDIT, people are our differentiator. As a Cyber Security Analyst Sr Advisor, you will help ensure today is...+ Provide vulnerability analysis and reporting on accredited information systems . + Create documentation such as SOPs, internal process… more
- Northrop Grumman (Linthicum Heights, MD)
- …Northrop Grumman, our employees have incredible opportunities to work on revolutionary systems that impact people's lives around the world today, and for generations ... keep building on our wide portfolio of secure, affordable, integrated, and multi-domain systems and technologies that fuel those missions. By joining in our shared… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …TS/SCI with Poly Level of Experience: Mid This opportunity resides with Warfare Systems (WS), a business group within HII's Mission Technologies division. Warfare ... Systems comprises cyber and mission IT; electronic warfare; and...cyberspace and anticipate emerging threats. Our capabilities in cybersecurity, network architecture, reverse engineering, software and hardware development uniquely… more
- Leidos (Odenton, MD)
- …malware threats targeting USCYBERCOM the Department of Defense Information Network (DODIN), and associated networks and organizations. This vital on-site ... in the Cyberspace domain. + Conduct forensic analysis of vulnerable or compromised systems and media and identify and analyze adversary TTPs and intrusion artifacts.… more