consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an More ❯
/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in More ❯
the integration of hardware and operating systems (OS). Understanding of data RAID, data backup uses and technologies. Install and configure software applications requested by end users. Work with Cybersecurity professionals to maintain security requirements and provide documentation and training on advanced IT processes and procedures and other tasks as assigned. Full time 100% Onsite position. Qualifications You Must Have More ❯
/SCI clearance looking to make an impact in national security? Join our team supporting the Air Force Research Lab in Rome, NY, where you'll work on groundbreaking cybersecurity and R&D initiatives. Job Description: Seeking a Systems Engineer to support the SecureView Program Management Office in Rome NY (onsite). Duties will include the software/hardware testing More ❯
data governance strategies across enterprise systems Lead efforts in data integration, quality assurance, and metadata management Define and enforce policies for data access, lineage, and lifecycle management Collaborate with cybersecurity and cloud teams to ensure secure data sharing and storage Support development of enterprise data architectures and services frameworks Ensure compliance with federal data policies and security standards Advise stakeholders More ❯
our environment. New applications within the SharePoint Farms need to be developed and implemented to meet the needs of the customers all while complying with Department of Defense (DoD) cybersecurity requirements and Microsoft's best practices for SharePoint. This project will require assisting current application developers with migrating existing ColdFusion applications into the SharePoint environment using the existing methodology used More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
cb5 Solutions, LLC
reliability Diagnose and resolve complex cloud-related technical issues Recommend functional approaches for new applications and services Provide input on enhancements to existing cloud products and features Qualifications: DoD cybersecurity experience Experience with AWS GovCloud Experience with containerization technologies and orchestration tools like Kubernetes Experience with Azure Familiar with DoD Accreditation Processes Familiar working in a SCIF environment Work well More ❯
years of experience w/Degree Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Experience with any of the following: IDA or IDA Pro, x64dgb, 011yDbg, Immunity Debugger, FireEye AX, and Ghidra. DOD 8140/DOD More ❯
of a small team • Technical competency in one of the following fields: SIGINT Collection/Analysis/Targeting, ELINT Collection/Analysis, Electronic Warfare (EW), Cryptologic Linguist, Radio Operations, CyberSecurity, Network Engineering/Security, Information Technology (with degree), HAM Operations and certification Education and Experience • Bachelor's Degree and four (4) years relevant experience. • Direct relevant and military experience More ❯
tomorrow s challenges today! SRG4 Government Services is a leading provider of information technology, training, engineering, accounting and intelligence analytical services for agencies in the intelligence, defense, homeland security, cybersecurity, and federal civilian markets. SRG4 utilizes an innovative approach to identify and qualify talent that is unique to the federal contracting industry, featuring a cutting-edge platform that allows More ❯
promote a culture of continuous improvement. Minimum Requirements: Five (5) years of process improvement experience, with at least two (2) years in an IT environment. Three (3) years of cybersecurity experience Certification in Lean Six Sigma Green Belt or higher preferred. Strong analytical, facilitation, and problem-solving skills. Proficiency in Microsoft Office Suite and process mapping tools (e.g., Visio). More ❯
SCI Employment Type: Full-Time About Echelon Services LLC Echelon Services LLC is a Native Hawaiian-owned SBA 8(a)-certified government contractor specializing in delivering mission-critical IT, cybersecurity, cloud, and intelligence solutions to the Department of Defense and federal agencies. Our teams work on the front lines of national security, providing forward-thinking services that support the evolving More ❯
design, development, installation and upgrade of development, support and tools as directed and follow IPT/SSA processes and procedures Support automation to the extent possible of test scripts, cybersecurity scans, and pipeline control gates Provide support for the CI/CD pipeline as directed and as managed by the SAFe, Agile, Kanban, and/or Scrum processes and backlog More ❯
overall operational support processes and staff. • Collect, investigate, and identify network optimization strategies and techniques to meet capacity and performance standards. • Work with information assurance teams and the AGUN cybersecurity service provider (CSSP) to ensure compliance to DoD standards to assist with maintenance of the network security posture. BASIC QUALIFICATIONS: • Minimum of a Bachelor's degree with 8+ years' experience More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Pontoon
Administrator (TCA) certification. Proven experience administering Tanium and other End Point security products in a medium to large enterprise environment. Eligible for SC Clearance. Strong understanding of endpoint management, cybersecurity principles, and IT operations. Experience with scripting languages (e.g., PowerShell, Python) for automation and reporting. Familiarity with Windows, Linux, and MacOS operating systems. Excellent problem-solving and communication skills. Ability More ❯
or equivalent Minimum of three years' experience as an Insider Threat analyst or relevant investigative or intelligence experience. Knowledge of incident response, crisis management, data management best practices, and cybersecurity trends Strong oral and written communication, analytical, critical thinking, data management, and research skills Experience conducting end-to-end investigations, including collecting and analyzing qualitative and quantitative data, and More ❯
or Masters +6 yrs or PhD + 4 yr Excellent communication and collaboration skills to interface across NSA Be able to identify intrusions and actors current intrusion sets commercial Cybersecurity Firms Need an understanding of Virtual Private Servers, VPNs, The Diamond Model, obfuscation networks, highly proficient agency tools, DX , Buffalo, CLEARVISION, CVEs, SSVE, VirusTotal Preferred Author and read highly technical More ❯
and Certified Ethical Hacker (CEH) EC-Council Security Clearance Required: Top Secret/SCI Education Level requirement: Bachelor's Degree in the following Area(s) of Study; Computer Science, Cybersecurity, Information Technology More ❯
Lexington, Massachusetts, United States Hybrid / WFH Options
John Galt Staffing
in compliance with best practices •Manage research networks, file shares, virtual infrastructures, and some SAN/NAS environments within the group •Remediate security vulnerabilities, and harden systems according to cybersecurity best practices in line with NIST 800-171, and CMMC guidelines •Develop and document technical processes and procedures •Work under minimal direction, and independently determine and develop approaches to complex More ❯
tasks in assigned OUs. Provide daily administration of the Windows based Virtual Machines and AECC services. Harden the Windows based services per commercial best practices and the required government cybersecurity controls. Troubleshooting and root cause analysis of any Windows issues. Coordinate and perform major OS version upgrades of virtual machines needing upgrades. Develop and maintain system, infrastructure, and process documentation More ❯
pipeline development and real-time data processing Proven ability to design and implement data-intensive solutions at scale Experience supporting analytics for the intelligence or defense community Knowledge of cybersecurity principles in big data environments Experience integrating AI/ML with mission systems or real-time applications Contributions to open-source data tools or participation in technical communities Join a More ❯
Reston, Virginia, United States Hybrid / WFH Options
LexisNexis Special Services Inc
foundational expertise in one or more of the following fields: Computer Science, Data Science, Data Analysis Criminology, Psychology, Applied Social Sciences Statistics, Mathematics, Systems Analysis, Engineering Intelligence, National Security, CyberSecurity Geographic Information Systems, Geospatial Analysis Location: Washington DC Metro Area/Northern Virginia Remote Work: Not eligible, COVID-19 mitigations may be required Travel: up to 25% travel may More ❯
the integration of hardware and operating systems (OS). Understanding of data RAID, data backup uses and technologies. Install and configure software applications requested by end users. Work with Cybersecurity professionals to maintain security requirements and provide documentation and training on advanced IT processes and procedures and other tasks as assigned. Must be able to develop solutions and documentation to More ❯
pose a national security threat. Have knowledge and understanding of all-source intelligence research and production, open-source and or commercial business due diligence, Supply Chain Risk Management (SCRM), Cybersecurity, Supply Chain Networks, Logistics or Business Analytics. Ability to create clear and concise reports in response to short notice RFIs. Able to write, prepare and deliver senior-level presentations and More ❯
a polygraph investigation. Description - SME implementing NCDSMO (National Cross Domain Strategy & Management Office), TSABI (Top Secret SCI and Below Interoperability) and SABI (Secret and Below Interoperability) information assurance/cybersecurity requirements to meet Raise-the-Bar. - Experience with the design, update, and manage a Cross Domain Solution (CDS) to support multiple Commercial Solutions for Classified (CSfC) connections and classification to More ❯