- Huntington Ingalls Industries (Virginia Beach, VA)
- …We Are HII Mission Technologies is seeking a highly skilled and motivated Systems Administrator to support the Navy Integrated Training Environment (NITE) ... fleet. With a holistic approach to life-cycle maritime defense systems -from small watercraft to submarines, surface combatants and aircraft...Candidate must have a current DoD 8570 IAT Level II certification (eg, Security + CE, CCNA … more
- Saliense Consulting (Arlington, VA)
- …best practices and cutting technology. + Manages team responsible for systems engineering, security engineering, and workstation and server vulnerability ... is now hiring a Senior Technical Consultant (Principal Network Systems Engineer) to join our team in support of...VLAN/LAN/WAN environment + Experience in installation and testing of security patches and cyber security products. +… more
- Imagine One Technology & Management (Dahlgren, VA)
- …recommendations for improving software and code design. + Contribute to a System Security Administrator and Operators Manual (SSAOM). Desired Experience: + Five ... this role.** Imagine One Technology & Management, Ltd. is seeking one (1) Security Software Engineer. This position is contingent upon award of the associated work… more
- CACI International (Stennis Space Center, MS)
- Journeyman Computer Systems Analyst Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: TS/SCI Employee Type: Regular ... * The Opportunity: CACI is hiring a Journeyman Computer Systems Analyst to join our team in Stennis, Mississippi!...our team in Stennis, Mississippi! The Department of Homeland Security (DHS) has a continuing requirement for Homeland Enterprise… more
- Leidos (Fort Meade, MD)
- …This role is primarily on the customer site at Scott AFB, IL. Administrator will provide support for assigned systems supporting Joint Worldwide Intelligence ... in both Linux and Windows environments to navigate current systems while managing network assets. + Lead focused multi-tier...+ Currently possess DoD 8750 certification at IAT level II , eg Security +ce or higher. + Currently… more
- CAE USA INC (Arlington, TX)
- …800-37 Guide for Applying the Risk Management Framework, NIST SP 800-53 Rev. 5 Security and Privacy Controls for Federal Information Systems and Organizations. + ... be the worldwide partner of choice in defense and security , civil aviation, and healthcare by revolutionizing our customers'...Assist in Cost Account Management. + High level system administrator skills under Windows or Linux (prefer both). +… more
- The County of Los Angeles (Los Angeles, CA)
- …solution of problems of organization, program, procedure, budget, or personnel. Option II : Two (2) years of highly responsible administrative or staff experience at ... of Los Angeles County Class of an Administrative Assistant III**, Assistant Hospital Administrator I , Contract Program Auditor , or higher. LICENSE A valid… more
- Leidos (Norfolk, VA)
- …issues. Ensures enterprise information systems are secure. *Validates systems follow cyber security policies and procedures. Ensures effective ... operating systems are functioning properly and conform to operation security policies and procedures. *Analyzes system alerts from various sources within the… more
- Insight Global (Colorado Springs, CO)
- …a well-rounded Infrastructure Engineer lead design of Information Technology (IT) systems and architecture, security and compliance management, and performance ... (USSPACECOM) command and control facilities. Manages and coordinates the systems design and provides installation oversight at a new...size and scope ($40M-50M, 35-40 personnel) Possess IAT/IAM Level II or greater (eg Security + CE, CCNA… more
- Insight Global (Montgomery, AL)
- …operations. -High school diploma or quivalent -Palo Alto Networks Certified Network Security Administrator (PCNSA) -IAT- II certification -TS-SCI Eligible ... to DoD security standards. -Perform complex analytics on boundary protection systems to protect system assets from compromise, data loss, and other requirements.… more