- GCI Communication Corp (Juneau, AK)
- …and ensure seamless connectivity. Accountable for the configuration, troubleshooting, security , and performance optimization of data communications hardware and ... foundational infrastructure supporting the organization's entire network, ensuring stability, security , and optimal performance. ESSENTIAL DUTIES AND RESPONSIBILITIES AT… more
- GCI Communication Corp (Anchorage, AK)
- …and ensure seamless connectivity. Accountable for the configuration, troubleshooting, security , and performance optimization of data communications hardware and ... foundational infrastructure supporting the organization's entire network, ensuring stability, security , and optimal performance. ESSENTIAL DUTIES AND RESPONSIBILITIES AT… more
- GCI Communication Corp (Juneau, AK)
- …necessary technology tradeoffs. Example NFRs are regulatory compliance and standards, security policies, and other immutable guardrails for the solution to adhere ... the solution adheres to the non-functional requirements (NFRs), particularly related to security and compliance. Own the creation of the solution roadmap using a… more
- US Customs and Border Protection (Ponce, PR)
- …Agent . AMO is actively seeking applicants to fill full-time security -based positions with the nation's largest law enforcement organization charged with ... maintaining the security of our national borders while facilitating lawful international...a one-time Recruitment Incentive payout of $10,000 after completing Federal Law Enforcement Training Academy (FLETC) (1 year service… more
- Applied Research Associates, Inc. (Warrendale, PA)
- …our Windows-11 developer fleet using WSL for Linux workflows to meet CMMC security requirements. This role is critical for maintaining the operational integrity and ... security of our systems as we develop and deploy...to notify all applicants of their rights pursuant to federal employment laws. For further information, please review the… more
- Red River (King George, VA)
- …cybersecurity, with experience in securing, configuring, and assessing network security products. This role involves proactive monitoring, troubleshooting, and ... implementing security measures to protect our program's data, systems, and...upon any protected characteristics as defined by state or federal law is wholly inconsistent with our company values… more
- Carnegie Mellon University (Pittsburgh, PA)
- …experience conducting and leading technical efforts in support of the US Federal Government (USG) and Department of Defense (DOD); managing technical teams; be ... and telecommunications - cybersecurity and operational resilience - information security models, frameworks, and metrics - foundational artificial intelligence… more
- National Renewable Energy Laboratory (Golden, CO)
- …access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security ... to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal...a registered trademark of the US Department of Homeland Security . This business uses E-Verify in its hiring practices… more
- National Renewable Energy Laboratory (Golden, CO)
- …access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security ... to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal...a registered trademark of the US Department of Homeland Security . This business uses E-Verify in its hiring practices… more
- National Renewable Energy Laboratory (Golden, CO)
- …access restrictions. All employees must also be able to obtain and maintain a federal Personal Identity Verification (PIV) card as required by Homeland Security ... to maintaining a drug-free workplace in accordance with the federal Drug-Free Workplace Act and complies with federal...a registered trademark of the US Department of Homeland Security . This business uses E-Verify in its hiring practices… more