and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Electronics Technician 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Electronics Technician 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
and much more. ABOUT US RealmOne is a mid-sized science and technology company dedicated to solving our customers' toughest mission challenges. Headquartered in Columbia, MD., RealmOne supplies advanced cybersecurity, data science, and software engineering services and products to customers in the Government and commercial sectors. RealmOne delivers encompassing mission assurance and critical systems support to government customers across various More ❯
and trust-we foster a collaborative and forward-thinking work environment. At M.C. Dean, we are committed to building the next generation of technical leaders in electrical, engineering, and cybersecurity industries. We are seeking an Electronics Technician 1 to join our Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of More ❯
/year. Primary Responsibilities: Examine JPEO-CBRND programs and system characteristics to determine whether compliance with DoDI 8500.01 is recommended or required and will develop an acquisition Cybersecurity Strategy when required. Ensure that each JPEO-CBRND program, when required, has a Cybersecurity Strategy that is consistent with DoD policies, standards, and architectures, to include relevant standards. Assist in the identification … maintain computer and network security software, including instances of the Assured Compliance Assessment Solution (ACAS), the Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG) Viewer, and other cybersecurity software test and scanning software applications. Document programs' overall cybersecurity approach and requirements, including determining the appropriate Certification and Accreditation (C&A) process, contributing content for Life Cycle Management Plans … LCMPs), assisting programs in the creation of a Security Classification Guide (SCG), and assisting in the development of Program Protection Plans (PPPs) Appendix E, the Cybersecurity Strategy. Manage information-related risks in enterprise architectures, acquisition strategies, and testing and evaluation, and work to achieve cybersecurity C&A. Ensure fielded information systems and networks are defended to maintain confidentiality, integrity, availability More ❯
network engineer working on a classified program • Strong understanding of traditional network engineering, routing and switching, firewall management o Worked directly with the cyber • Expertise in network security and cybersecurity to implement best practices and advanced protocols • Excellent communication skills and experience working directly with a government customer • Open to 70% OCONUS travel Preferred Qualifications for Sr. Network Engineer More ❯
GA, TX, OH, UT, HI, AK Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an More ❯
We are seeking passionate people to grow the CyberSecurity team within WTW and provide an excellent service and trusted expertise to all parts of our business. As part of a business wide transformation, we have an exciting opening for a new role of Global Head of Cyber Detections. As part of the Cyber Defence and Security Operations department, you … services for global organisations and are used to working in a high-pressure environment with geographically dispersed teams across different time-zones. The Role To detect and investigate all cybersecurity related incidents across WTW and escalate cases to relevant Incident Response teams Manage a geographically dispersed team supporting SOC based detection services on a 24/7/… to ensure an efficient incident life cycle is maintained Implement KPI and SLA's and monitor adherence to targets Maintain a membership list and call out details of the CyberSecurity Incident Group ensuing incidents are raised to the correct resolver groups when appropriate Implement regular Table Top Exercises to test SOC processes and procedures Conduct Quality Assurance reviews of More ❯
financial services organisation, I am seeking an experienced Infrastructure Architect additionally with a background in Security Architecture. The Infrastructure Architect will possess broad knowledge in Cloud Infrastructure, Platforms and CyberSecurity with a focus on capability enhancements and continuous improvement. This role involves collaborating with cross-functional teams to understand business requirements, providing technical leadership, and ensuring the design meets … reference architectures. Provide technical guidance to team members and stakeholders. Skills/Experience required: At least 8 years experience in an Infrastructure Architecture capacity additionally with experience in authoring CyberSecurity Architecture. Experience in a regulated financial services environment (banking/insurance preferred) Experience in IaC (nice to have) Automation experience highly advantageous e.g. Ansible/Jenkins (alternatives considered). More ❯
financial services organisation, I am seeking an experienced Infrastructure Architect additionally with a background in Security Architecture. The Infrastructure Architect will possess broad knowledge in Cloud Infrastructure, Platforms and CyberSecurity with a focus on capability enhancements and continuous improvement. This role involves collaborating with cross-functional teams to understand business requirements, providing technical leadership, and ensuring the design meets … reference architectures. Provide technical guidance to team members and stakeholders. Skills/Experience required: At least 8 years’ experience in an Infrastructure Architecture capacity additionally with experience in authoring CyberSecurity Architecture. Experience in a regulated financial services environment (banking/insurance preferred) Experience in IaC (nice to have) Automation experience highly advantageous – e.g. Ansible/Jenkins (alternatives considered). More ❯
how and proven experience. The role involves managing a virtual team of IT Network, Infrastructure and Security Experts and Managers to drive standardization and governance for IT infrastructure and Cybersecurity within OneATM. This includes the development and deployment of standardized IT infrastructure and security solutions, leveraging Blueprints and Frequentis Evergreen practices, refer to: Air Traffic Management Frequentis. Key responsibilities include … coordinating support for Sales and Offering, specifically in IT infrastructure and Cybersecurity, as well as facilitating support for Project Delivery to ensure seamless implementation and compliance. Aufgaben Shaping the ATM (Air Traffic Management) Network, Infrastructure, Cybersecurity Strategy Develop and maintain a comprehensive strategy and roadmap in collaboration with Business Units/Market Units internationally, covering products and project needs Leveraging … Units Compliance with Security Governance and Industry Standards Guarantee adherence to Frequentis security governance policies and relevant ATM industry standards Creation and implementation of Frequentis OneATM Security Strategy, incl. Cybersecurity business models Profil Bachelor's or master's degree in Information Technology, Computer Science or a related field 10 years proven experience in IT (development, architecture, project management) 3 years More ❯
packet-level analysis - Experience conducting trend analysis Desired Skills: Python programming experience - Strong math and science background - Experience with Carnegie Mellon SiLK tool suite Required Education: BS Computer Science, CyberSecurity, Computer Engineering, or related degree; or HS Diploma & 10 years of network investigations experience. Desired Certifications: One or more of the following professional certifications: GNFA, GCIH, GCIA, GSEC, CASP+ More ❯
teammates, stakeholders, and intelligence consumers Qualifications: Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Note that 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an … with an associate degree Benefits: Weeghman & Briggs was established in 2016. We are a team of like-minded people who do business, generate ideas and realize them. Consulting and CyberSecurity are our main directions and we know how to deal with many current issues and provide the best services in offering resolutions. Weeghman & Briggs is an Equal Employment Opportunity More ❯
network engineer working on a classified program • Strong understanding of traditional network engineering, routing and switching, firewall management o Worked directly with the cyber • Expertise in network security and cybersecurity to implement best practices and advanced protocols • Excellent communication skills and experience working directly with a government customer • Open to 70% OCONUS travel Preferred Qualifications for Sr. Network Engineer More ❯
s in it for you? Attractive salary and employee benefits package Once-in-a-career growth opportunities - unique chance to be part of a high-growth business Work with cybersecurity thought leaders to deliver world-class services A dynamic, independent environment where you're given flexibility to do your best work Ongoing personal development and ongoing career training More ❯
Minimum Basic Requirements for Skills, Experience, and Credentials include: Master's degree in an area of Science, Technology, Engineering or Mathematics with at least 10 years' experience as a cybersecurity professional OR a Bachelor's degree in an area of Science, Technology, Engineering or Mathematics with at least 12 years' experience as a cybersecurity professional . Active TS security clearance More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯
audit records are collected, reviewed, and documented (to include any anomalies) Attend required technical and security training (e.g., operating system, networking, security management) relative to assigned duties Execute the cybersecurity portion of the self-inspection, to include provide security coordination and review of all system assessment plans Identify cybersecurity vulnerabilities and assist with the implementation of the countermeasures More ❯