- Exeter Government Services, LLC (Fort Knox, KY)
- …DoD SECRET level security clearance. . Familiarity with Committee on National Security Systems (CNSSI) 1253 and overlays. . Working knowledge of Army ... and meet deadlines. Desired Qualifications: . Bachelors' Degree in Computer Science, Cybersecurity, or related field. Substantial experience in...4 and the RMF Process. . Experience with physical security aspects of Army Information Systems to… more
- NANA Regional Corporation (South Burlington, VT)
- …Microsoft Azure Solutions Architect, Google Cloud Professional Architect, Certified Information Systems Security Professional (CISSP), etc. + Prior experience ... solutions align with enterprise goals, regulatory compliance, performance, cost, security , and scalability requirements. **Location: Remote** **New contract award… more
- Microsoft Corporation (Redmond, WA)
- …devices, and clouds in our customers' heterogeneous environments, as well as ensuring the security of our own internal estate. Our culture is centered on embracing a ... while enabling friction‑free adoption of emerging technologies? If so, the Emerging Security Assurance (ESA) team in Microsoft's CISO organization is looking for… more
- TEKsystems (Reston, VA)
- …in alignment with Army and USACE policies. + Configure, manage, and maintain NAC systems to ensure optimal performance and security . + Develop and enforce NAC ... on designing, implementing, and maintaining secure network access control systems in compliance with NIST 800-53, DISA STIGs, and...years of experience in cybersecurity with a focus on vulnerability management and network security . + Proven… more
- Oracle (Santa Fe, NM)
- …empowering enterprise customers worldwide through automation, scalability, and security . The Infrastructure Engineering Services (IES) Federal Network Engineering ... a foundational role in this mission, delivering enterprise-grade networking and security solutions that power Oracle's most critical workloads across US-based OCI… more
- State of Massachusetts (Framingham, MA)
- …information systems or external users of agency-based intelligence information systems when needed. * Conduct computer -based background research on suspects ... intelligence analysis of significant criminal threats to public safety and homeland security on a proactive basis. * Conduct threat/ vulnerability assessments.… more
- TekSynap (Radford, VA)
- …(ACAS) infrastructure, including system configuration, scanning schedules, reporting, and vulnerability analysis in accordance with DISA ACAS Best Practices Guide. ... + Perform Security Technical Implementation Guide (STIG) compliance scans and generate...Guide (STIG) compliance scans and generate reports to ensure systems meet DoD cybersecurity standards. + Manage Army Endpoint… more
- PDS Tech Commercial (Fort Worth, TX)
- …and manual troubleshooting + Partner with IT peers to ensure compliance with security controls, vulnerability management, and system currency + Respond quickly ... detailed system and support documentation **Required Qualifications** + Bachelor's degree in Computer Science, Information Systems , Computer Engineering, or… more
- conEdison (New York, NY)
- **Required Education/Experience** + Master's Degree in Computer Science, Information Technology. and 2 years of relevant work experience. or + Bachelor's Degree in ... Computer Science, Information Technology. and 3 years of relevant...building and managing Windows, Oracle & RedHat based server systems and architectures required. + Hands on designing and… more
- General Dynamics Information Technology (Herndon, VA)
- …Engineer with GDIT. A career in enterprise IT means connecting and enhancing the systems that matter most. At GDIT you'll be at the forefront of innovation and ... for a DevOps Engineer to join a high-impact team supporting mission-critical systems for enterprise applications in cloud and on-premise environments. The ideal… more