regulations and industry best practices. Provide expert-level support for system upgrades, migrations, and modernization initiatives. Train and mentor junior analysts and end-users as needed. Collaborate with engineers, cybersecurity specialists, and project managers to deliver integrated solutions and support lifecycle management. Qualifications High School diploma or GED Active Secret Government Clearance Minimum of 5 years computer system experience, to More ❯
opportunities. Consult with customer stakeholders to resolve issues, align priorities, and facilitate decision-making on technical and operational matters. Ensure compliance with DoD, Air Force, and AF TENCAP-specific cybersecurity, accreditation, and IT policy requirements. Maintain IT security vigilance, ensuring that security considerations are integrated into all projects, procurement actions, and operational plans. Operate with a high degree of autonomy More ❯
tool - proficient in combining functions (.e.g., ISNA, IF, VLOOKUP) for data analysis. • Experience documenting in Atlassian Confluence using macros is desirable. • Must possess at least one current AWS or cybersecurity certification prior to start. Qualified candidates should APPLY NOW for immediate consideration! Please hit APPLY to provide the required information, and we will be back in touch as soon as More ❯
Presidio means stepping into a culture of trailblazers-thinkers, builders, and collaborators-who push the boundaries of what's possible. With our expertise in AI-driven analytics, cloud solutions, cybersecurity, and next-gen infrastructure, we enable businesses to stay ahead in an ever-evolving digital world. Here, your impact is real. Whether you're harnessing the power of Generative AI More ❯
s degree and a minimum of 8 years of prior relevant experience or a master's degree and a minimum of 6 years of prior relevant experience. • An active cybersecurity certification, qualified for DoD 8570 IAT Level 2 on start date. IAT Level 2 requires one or more of the following Professional Certifications: Security+ CE, CCNA Security, GICSP, GSEC More ❯
stakeholders on network usage, security protocols, and operational best practices. Maintain constant IT security vigilance, proactively identifying, mitigating, and reporting network threats in accordance with DoD 8570.01-M, AF cybersecurity directives, and AFI 17-130. Operate with a high degree of autonomy, making informed decisions to support AF TENCAP's dynamic mission priorities and ensure network readiness in rapidly More ❯
G2 operations at Fort Leavenworth, KS. The selected candidate will support classified and unclassified IT environments, troubleshooting technical issues, assisting users, and ensuring system functionality in alignment with DoD cybersecurity protocols. This role requires at least three (3) years of experience in IT support, particularly in government or DoD environments, with an emphasis on incident resolution, system administration, and user More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Oak Leaf Solutions
CLEARANCE REQUIREMENTS: Top Secret with SCI (TS/SCI) About Oak Leaf Solutions Founded in 2008, Oak Leaf Solutions is a mission-driven small business delivering advanced systems engineering, cybersecurity, and technical operations to U.S. Government customers. We specialize in high-impact work that supports national security, while cultivating a culture that values innovation, integrity, and employee well-being. At More ❯
Data Intelligence, DI is an established small business that has supported the critical missions of our government clients since 2005. We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics support to C4ISR and other complex systems. We are an equal opportunity employer that offers competitive salaries, comprehensive benefits, a team-oriented environment, and opportunities More ❯
vehicle systems and network architecture. Methodologies: Agile software development processes and tools. Special Requirements: Ability to work on and around military vehicles; must pass ASR test for confined space. Cybersecurity Knowledge: Understanding of authentication, non-repudiation, confidentiality, and integrity; experience implementing secure embedded systems using cryptography. Moseley Technical Services, Inc. is an AA/EEO/Veterans/Disabled Employer. More ❯
TS/SCI About Us Eccalon provides global solutions to the most challenging technological issues of the 21st-century, and our evolving portfolio spans eight major markets: Machine Learning, Cybersecurity, Aerospace & Defense, Material Sciences, Advance Manufacturing, Sports Science, Biotechnology, and Health & Life Sciences. Visit our website here. Why Join Us? Eccalon's Executives foster a supportive work environment allowing our More ❯
VA On-site About Us Eccalon provides global solutions to the most challenging technological issues of the 21st-century, and our evolving portfolio spans eight major markets: Machine Learning, Cybersecurity, Aerospace & Defense, Material Sciences, Advance Manufacturing, Sports Science, Biotechnology, and Health & Life Sciences. Visit our website here. Why Join Us? Eccalon's Executives foster a supportive work environment allowing our More ❯
Security and Electronic Systems (SES) business Unit. As part of (SES) Strategic Business Unit you will be part of a dynamic team responsible for design, implementation, operations & maintenance, and cybersecurity for large complex resilient hardware and virtualized infrastructure to ensure implemented solutions meet stakeholder needs, standards, and performance requirements. Responsibilities As part of a multidisciplinary team, you will provide support More ❯
the ability to obtain a Full Scope Polygraph) The Britton Group is a premier provider of intelligence and national security solutions, specializing in mission-critical IT services, digital transformation, cybersecurity and specialized intelligence support. With over 25 years of experience delivering innovative, secure, and agile solutions to the federal government, The Britton Group stands as a trusted partner in the More ❯
deploy, and maintain DevSecOps infrastructure tools while ensuring secure, reliable, and efficient system operations. This is a senior-level, hands-on engineering role where you will manage infrastructure, support cybersecurity objectives, and drive automation in a Linux-based environment. Key Responsibilities • Design, deploy, test, certify, patch, and maintain DevSecOps infrastructure tools. • Oversee Operations & Maintenance (O&M) of multiple mission tools. More ❯
150K- 155K Background Evaluate target opportunities using all source data to understand and map target networks, and to assist in developing detailed Exploitation and operations plans Analyze SIGINT and cybersecurity data at multiple levels up and down the OSI network stack and bring a solid understanding of logical/physical IP core infrastructure, communication devices and how they connect to More ❯
automation platform About Kaizen Approach We love what we do, and that drives us to create the best possible results for our customers. We apply years of experience in Cybersecurity and Learning & Development to guide our customers in ongoing improvements that keep their employees' skills current and their companies protected. Our reputation is built on the skills and successes of More ❯
tools (Python, Bash, PowerShell, etc.) for network automation and management Support SD-WAN initiatives and modernization efforts Work with radio and wireless networking technologies (preferred) Ensure compliance with DoD cybersecurity requirements, including DISA STIGs and RMF Create and maintain thorough network documentation and architecture diagrams Required Qualifications Cisco Certified Network Associate (CCNA) or higher CompTIA Security+ (DoD 8570/ More ❯
including program execution, growth, and risks management. The IT Program Manager is responsible for managing the team that provides NSWCDD support to include database management; network operations, system administration, cybersecurity, and information assurance; information services and technology; facilities operations; logistics; program analysis; technical documentation; and visual information support. Responsibilities Must be responsive, reliable, detail-oriented, and possess a strong motivation More ❯
VIEW ALL OPENINGS Visit us at ABOUT Black Eagle Defense is a Maryland-based small business providing IT, Cybersecurity, and Consulting Services to the public sector. Our team is built on continuous learning, adaptability, and technical excellence. LOCATION Annapolis Junction, MD Aurora, CO CLEARANCE REQUIRED Active TS/SCI w/Polygraph SALARY RANGE MD: $128,000 - $185,000/ More ❯
VIEW ALL OPENINGS Explore more opportunities at ABOUT Black Eagle Defense is a Maryland-based small business providing IT, Cybersecurity, and Consulting Services to the public sector. Our team thrives on continued learning, versatility, and adaptability in a rapidly evolving tech landscape. LOCATION Annapolis Junction, MD ️ Telework up to 16 hours/week (based on sprint tasking) CLEARANCE REQUIRED Active More ❯
/platform as a service, microservices, containerization, and web-based systems. Experience with AMMP, Cucumber, GIT, Khaos (M2C2 FD), Kubernetes, Oracle, Postgres, SonarQube, Weblogic, WIGS/Angular. Experience with cybersecurity, DevSecOps, and CI/CD processes. Experience working with full stack development. Pay Rate: Pay range offered to a successful candidate will be based on several factors, including the candidate More ❯
Add and remove client devices (e.g., PCs, Thin Clients, VoIPs, VoSIPs, VTCs, DVTCs, peripherals, etc.) from networks. Update and patch network equipment, firmware and software to ensure configuration and cybersecurity compliance. Operate and maintain access control systems; and manage and configure MAC address authentication. Administer network administrative accounts and access. Operate and maintain network monitoring and analysis tools; and detect More ❯
Are you a Project Manager, experienced in developing and/or maintaining IT systems, with a passion for CyberSecurity within the Automotive Industry? Expleo are currently recruiting a CyberSecurity Project Manager, on behalf of our Global Automotive client based in Bedfordshire, on a contract basis. As a Connected Car Cybersecurity Project Manager, you will develop a deep working … knowledge of the features that make up Connected Car. Responsibilities of the CyberSecurity Project Manager include- * Coordinate and align schedules with stakeholders to ensure compliance with UN-R155. * Present progress reports on cybersecurity topics. * Assess future capability requirements and coordinate team-building efforts. * Maintain regular communication and coordination with Legal and Compliance teams. * Gather and communicate necessary cybersecurity information … trends and features in iOS, Android, and Cloud, and assess their impact on cybersecurity. * Develop and establish the cybersecurity implementation plan. Skill's, qualifications and background required for the CyberSecurity Project Manager role include- * Degree qualified (or equivalent) in a relevant discipline. * Experience in developing and maintaining IT systems. * Strong background within Project Management in the IT Industry. * Ability More ❯
and design. All underpinned by technology created with purpose. YOUR ROLE The Invent Digital Trust & Security (DT&S) practice focuses on ensuring secure business outcomes for our clients, providing Cybersecurity advisory and transformation consulting in areas such as security strategy, risk management, human risk management, data and identity security, secure intelligent industry, Gen-AI risk, and security operations modernisation. Our … security specialists and innovators enable our clients to evaluate cyber risks, redesign Cybersecurity operating models, modernise digital identity capabilities, lead programmes to drive security culture change, and transform security and compliance regimes to make them efficient, effective, sustainable, and resilient. For this role, we are looking for individuals with experience in Cybersecurity to help embed security culture and practices. We … business, model our values and behaviours, and coach and develop junior members of the team. Key expectations from this role include: Leading projects for our clients which transform their Cybersecurity and Architecture capabilities to reduce business and technology risk. Providing expertise in the strategic, organisational, and human aspects of Cybersecurity. For example, security strategy definition which is often the first More ❯