- P 11 Security, Inc. (El Segundo, CA)
- …to Special Access Program Information + Willingness to submit to a Counterintelligence polygraph Other Requirements: + Must be familiar with security policy/manuals ... and the appropriate ICDs/JAFANs/DOD Manuals and other guiding policy documents + Familiarity with Risk Management Framework (RMF) and Joint SAP Implementation Guide (JSIG) processes for system accreditation, along with legacy (DITSCAP, DIACAP) processes + Must… more
- General Dynamics Information Technology (Albuquerque, NM)
- …Program Information + * Willingness to submit to a Counterintelligence polygraph **Other Requirements:** + US Citizenship Required \#AirforceSAPOpportunities The ... likely salary range for this position is $162,775 - $220,225. This is not, however, a guarantee of compensation or salary. Rather, salary will be set based on experience, geographic location and possibly contractual requirements and could fall outside of this… more
- ManTech (Los Angeles, CA)
- …access to Special Access Program Information + Willingness to submit to a Counterintelligence polygraph **Physical Requirements:** + Must be able to remain in a ... stationary position 50% + The person in this position frequently communicates with co-workers, management and customers, which may involve delivering presentations. + Must be able to exchange accurate information in these situations. + Constantly operates a… more
- Chenega Corporation (Cape Canaveral, FL)
- …+ Active TS/SCI clearance with the ability to complete a government Counterintelligence Scope Polygraph (CI Poly) **Knowledge, Skills, and Abilities:** + DAWIA or ... FAC Level III certified or equivalent is preferred. + Proficient in Microsoft Office. + Proficient in classified accounting systems. + Momentum is preferred. + Ability to work under aggressive schedules with demanding performance requirements. + Ability to… more
- RightDirection Technology Solutions LLC (Washington, DC)
- …evaluation as required; + Prepare and review test and exercise plans; Support counterintelligence efforts to manage insider threat and other human factors risks; + ... Prepare indicator creations for IDS systems; Provide security impact assessment, evaluation, and recommendations to the Architect and TFIN Change Control Board (CCB); + Assist in technical incident response exercises and activities. Requirements + Active… more
- Chenega Corporation (Washington, DC)
- …+ Active TS/SCI clearance with eligibility to obtain a Government Counterintelligence Scope Polygraph (CI Poly). **Knowledge, Skills, and Abilities:** + Possess ... an understanding of acquisition and contracting processes for complex systems, research and development projects, and classified programs, in compliance with FAR, DFARS, and AFFARS. + Ability to conduct cost and price analyses, perform market research, and… more
- SOS International LLC (Reston, VA)
- …requests concerning force protection, indications and warnings, counter threats, counterintelligence , and all source intelligence integration and assessments. + ... Assemble, analyze, and prioritize open-source material into protective intelligence and force protection assessments. + Prepare and present intelligence collection assessments and briefings to customers and advise key leadership of force protection concerns… more
- SAIC (Quantico, VA)
- …sustain, modernize and transform the enterprise IT capabilities for the Defense Counterintelligence and Security Agency (DCSA). The Air Force and Combatant Commands ... Business Group of SAIC is seeking a Desktop Engineer (SCCM) to support a transformational infrastructure program for DCSA. SAIC is proud to be supporting DCSA in safeguarding our nation's information. DCSA is the designated oversight authority on the… more
- SOS International LLC (Fort Belvoir, VA)
- …supporting finished intelligence analysis. + Active DoD TS/SCI clearance with Counterintelligence Poly. + Proficient in conducting all-source analysis of foreign ... defense industrial programs, infrastructure, and capabilities supporting a foreign country's ability to develop, equip, sustain, and employ its military forces across basic, strategic, and military industrial sectors. + Experience assessing the research,… more
- Cipher Tech Solutions (Vienna, VA)
- …are then used to support federal and military law enforcement, counterintelligence , and counter terrorist activities. Malware reverse engineering is the practice ... of analyzing malicious code. The goal of a reverse engineer is to understand how the malicious code works and determine facts such as: *How did it infect the victim's computer *What kind of information it is seeking to steal *How is it communicating with the… more