- Southwest Power Pool (Little Rock, AR)
- …a Lead Network-Telecom Administrator, you will be responsible for the advanced administration and support of the networking, security , and telecommunications ... all be considered during the hiring process. Lead Network-Telecom Admin | Pay Range - $109,500.00 - $142,250.00. **Are...+ Perform advanced diagnostics and resolution of network, telecom, security , and data center issues with minimal disruption to… more
- Executive Office for US Attorneys and the Office of the US… (Washington, DC)
- …the Criminal Division. The Asset Forfeiture Unit utilizes criminal, civil, and administrative tools to punish and deter criminal activity by depriving criminals of ... perpetrating frauds against financial institutions and online through cryptocurrencies; and cyber -enabled frauds (such as ransomware) and crimes (such as hacking to… more
- Huntington Ingalls Industries (Alexandria, VA)
- …Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $61,911.00 - $90,000.00 Security Clearance: Ability to Obtain Level of Experience: College This ... a business group within HII's Mission Technologies division. Warfare Systems comprises cyber and mission IT; electronic warfare; and C5ISR systems. HII works within… more
- ISC2 (St. Paul, MN)
- …developing security policies and procedures for examination content development, administration , and security . + Collaborates with the other ISC2 business ... support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications...+ Provides for and maintains item bank and workshop security in accordance with program guidelines. + Assists with… more
- Huntington Ingalls Industries (San Diego, CA)
- …Type: Full Time/Salaried/Exempt Anticipated Salary Range: $81,401.00 - $115,000.00 Security Clearance: Secret Level of Experience: Mid This opportunity resides ... with Global Security (GS). Mission Technologies' Global Security (GS)...Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment,… more
- Nightwing (Sterling, VA)
- …to drive IT improvements. + Deliver Linux (RHEL, Ubuntu, Debian) administration experience, including package management, security hardening, kickstart, and ... Nightwing provides technically advanced full-spectrum cyber , data operations, systems integration and intelligence mission support services to meet our customers'… more
- Huntington Ingalls Industries (Coronado, CA)
- …Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $81,782.00 - $100,000.00 Security Clearance: Ability to Obtain Level of Experience: College This ... opportunity resides with Global Security (GS). Mission Technologies' Global Security (GS)...Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment,… more
- SAIC (Scott AFB, IL)
- …will be provided to the USTC Command, Control, Communications & Cyber Systems Directorate (TCJ6). **Key Responsibilities:** + Provide hands-on development and ... implementation of commercial cloud solution architectures, focusing on security , scalability, and resiliency. + Plan, design, and manage the migration,… more
- Huntington Ingalls Industries (Fairfax, VA)
- …Employment Type: Full Time/Salaried/Exempt Anticipated Salary Range: $86,378.00 - $109,054.40 Security Clearance: Ability to Obtain Level of Experience: Senior This ... opportunity resides with Global Security (GS). Mission Technologies' Global Security (GS)...Our capabilities range from C5ISR, AI and Big Data, cyber operations and synthetic training environments to fleet sustainment,… more
- Washington Metropolitan Area Transit Authority (VA)
- …deployment, configuration and maintenance processes for network monitoring, defensive and administrative cybersecurity tools. Develops content for cyber defense ... Engineering (CE) Program Lead reports to the Information System Security Manager (ISSM) for Engineering and serves as the...tools. Identifies potential conflicts with implementation of any cyber defense tools (eg, tool and signature testing and… more