- UIC Government Services and the Bowhead Family of Companies (Solomons, MD)
- …Master Chief. + Intermediate to advanced level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint + Ability to communicate effectively ... Must be able to twist, bend and squat periodically SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security... SECURITY CLEARANCE REQUIREMENTS: Must currently hold a security clearance at the Secret level. US Citizenship is… more
- General Dynamics Information Technology (Annapolis Junction, MD)
- …Linux and Windows operating systems and installs/loads operating system software , troubleshoots, implementing operating systems enhancements to improve reliability ... configuration management, implementation, and sustainment of compliance with applicable system security controls. + Perform periodic vulnerability scans of systems +… more
- University of Maryland, Baltimore (Baltimore, MD)
- …and university strategic efforts. * Monitor and administer learning management systems security to include support for addition and removal of user access, quota ... administration, audits and security problem resolution. *Learning and Development* * Designs, develops,...*Other:*Proficient in the use and functions of learning management software and systems. Except for qualifications established by law,… more
- Advanced Technology and Research Corporation (Bethesda, MD)
- …write automation scripting tools using MATLAB + Familiar with finite element analysis software such as Abaqus + Familiar with finite element mesh generation tools ... must be a US citizen with the ability to obtain and maintain a security clearance or favorable adjudication of a national security background investigation.… more
- UIC Government Services and the Bowhead Family of Companies (Aberdeen, MD)
- …and issuing equipment or supplies. + Intermediate level skills in Microsoft Office software suite - Word, Excel, Outlook, PowerPoint. + Valid state Driver's License ... Repeat the same movements. + Exposure to excessive noise. SECURITY CLEARANCE REQUIREMENTS:Must be able to obtain a ...SECURITY CLEARANCE REQUIREMENTS:Must be able to obtain a security clearance at the Public Trust level. Due to… more
- Red Hat (Annapolis, MD)
- …cover use cases such as infrastructure automation, application deployment, compliance, and security orchestration * Contribute to the integration of Ansible with key ... Familiarity with containerization and orchestration platforms * Working knowledge of security principles across infrastructure, OS, cloud, and hypervisors * Comfort… more
- KaylaTek, Inc. (MD)
- …not just a place to work. CERTIFICATIONS: + DOD 8570 IAT-II certification ( SECURITY + CE or equivalent) - required certification DAY SHIFT: 100% Full time onsite ... the root cause and categorizing issues by type (eg, hardware, software , applications, telecommunications, desktops, mobile devices, printers). + Collaborate with… more
- Northrop Grumman (Linthicum Heights, MD)
- …Systems sector delivers a decisive advantage to its customers through software -defined, hardware-enabled solutions. The Electrical Design and Analysis (EDA) section ... contributions have a direct effect on the safety and security of the country and its allies. Our culture...needs **Preferred Qualifications:** + Active Top Secret / SCI security clearance + Experience in Worst Case Circuit Analysis… more
- Global Dimensions (Fort Meade, MD)
- …with exciting opportunities in language/culture, training/education/instruction, IT, cyber security , and intelligence (analysts, CI, HUMINT, SIGINT, etc.). We ... NCS POI to be delivered. Requirements + Current/Active TS/SCI Security Clearance + A counterintelligence (CI) polygraph within the...of a company producing a Signals Analysis tool (hardware, software ) that teaches industry and DoD customers how to… more
- Highmark Health (Annapolis, MD)
- …+ Experience with end-user reporting tools + Familiarity with the Software Development Lifecycle Process + Strong written and verbal communication skills ... Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices… more