• Information Systems Security Engineer

    TekSynap (Chantilly, VA)
    …during the lifecycle of the system including updating network diagrams, vulnerability scans, STIG checklists, hardware/software lists, and SCRM certificates. + ... Maintains responsibility for the day-to-day security operations of the system ensuring the network, system, application, or service is operated, maintained, and disposed of in accordance with SDA security policies and procedures outlined in the security… more
    TekSynap (12/06/25)
    - Related Jobs
  • Enterprise Infrastructure Systems Administrator

    KBR (Sioux Falls, SD)
    …containers, and specialized software. + Perform system maintenance, patching, and vulnerability remediation to ensure a secure and stable environment. + Troubleshoot ... and resolve system issues using diagnostic tools and root cause analysis. + Manage user access controls and system security settings. + Develop and maintain technical documentation, including SOPs and system configurations. + Serve as a technical lead on IT… more
    KBR (12/06/25)
    - Related Jobs
  • Information Systems Security Officer (ISSO)

    KBR (Beavercreek, OH)
    …achieve this through passive evaluations (compliance audits) and active evaluations ( vulnerability assessments). Position is a corporate position, and employment is ... not tied to a contract. + Candidate will perform Information Assurance and IT Security tasks to ensure the secure operation of the KBR information systems as a part of the KBR Information Assurance Operations team. + Establishes strict program control… more
    KBR (12/06/25)
    - Related Jobs
  • Sr. Coastal Engineer

    APTIM (Boca Raton, FL)
    …+ Living shoreline design and ecosystem restoration + Adaptation plans, vulnerability assessments, and resiliency strategies **Basic Qualifications:** + 7+ years of ... coastal engineering experience + Bachelor's Degree in Civil or Coastal Engineering required + Professional Engineer (PE) license in the State of Florida or the ability to be licensed within 90 days of hire + In depth understanding of the coastal and marine… more
    APTIM (12/06/25)
    - Related Jobs
  • Tier 1 Technician

    Nightwing (Pensacola, FL)
    …include cyber space operations, cyber defense and resiliency, vulnerability research, ubiquitous technical surveillance, data intelligence, lifecycle mission ... enablement, and software modernization. Nightwing brings disruptive technologies, agility, and competitive offerings to customers in the intelligence community, defense, civil, and commercial markets. NightWing is supporting a US Government customer on a large… more
    Nightwing (12/06/25)
    - Related Jobs
  • Systems Administrator - COMSEC

    KBR (Chantilly, VA)
    …and document scheduled maintenance, including patches & hotfixes + Assessment: vulnerability , document, and mitigate + Access: Help users with requests (permissions, ... access, etc.) + Systems: Make recommendations for future systems Work Environment: + Location: On-site. + Travel Requirements: Minimal travel. + Working Hours: Standard 40 hours per week. Qualifications: Required: + Clearance: Top Secret SCI with Polygraph. +… more
    KBR (12/06/25)
    - Related Jobs
  • Sr. SOAR Engineer- Splunk SOAR/Phantom | Remote,…

    Optiv (Phoenix, AZ)
    …Experienced with multiple security concepts and methods, such as vulnerability assessments, data classification, privacy assessments, incident response, security ... policy creation, enterprise security strategies, architectures, and governance. + Strong understanding of networking (TCP/IP, OSI model), operating system fundamentals (Windows, Linux), and security technologies (endpoint security, DLP, firewalls, IDS/IPS,… more
    Optiv (12/06/25)
    - Related Jobs
  • Cybersecurity Compliance Specialist

    Alaka'ina Foundation Family of Companies (Arlington, VA)
    …Protocols, Services Management (PPSM) Compliance + DoD Cyber Scorecard Compliance + Vulnerability Scanning and Analysis + IT Personnel Security Auditing + Other ... duties as assigned. REQUIRED DEGREE/EDUCATION/CERTIFICATION: + Bachelor of Science in Computer Science or related field or 3-5 years of experience in the cybersecurity field. + IAM Level II, IAW AR 25-2 and DA Pam 25-2-6 REQUIRED SKILLS AND EXPERIENCE: +… more
    Alaka'ina Foundation Family of Companies (12/06/25)
    - Related Jobs
  • Cybersecurity Program Manager - Operational…

    DuPont (Wilmington, DE)
    …between IT, Automation & Process Control (A&PC), Operations, Incident Response, Vulnerability Management, and the broader Cyber Operations leadership. The position ... ensures alignment of cybersecurity standards and practices across diverse technical teams, enabling resilient and secure OT ecosystems. Facilitates cross-functional alignment with long-term strategic priorities and ensure transparency and coordination in the… more
    DuPont (12/06/25)
    - Related Jobs
  • Cyber Security Intern

    Ingersoll Rand (Davidson, NC)
    …and hands-on coursework (lab) experience with cybersecurity endpoint, network, vulnerability , forensic and log management tools. + Basic understanding, knowledge ... of and hands-on capabilities with operating system configuration (Windows, Unix, Linux) and networking (DNS, DHCP, routing protocols). + Ability to analyze event and incident logs, and work with detect and respond teams to assess security events related to… more
    Ingersoll Rand (12/06/25)
    - Related Jobs