well-being. This includes 100% employer- paid medical insurance, ample paid leave, a free employee assistance program, and a competitive 401k savings plan. At Watermark, our people come first! Information Operations Specialist In this role you will Perform technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the … Writing, and Major Command follow-up) Education Requirements: Bachelor's of Science degree in Computer Science or equivalent field A minimum of 3-5 years experience working in the Information Technology field Security Clearance Requirements: TS/SCI Other Requirements: May be required to move equipment/files weighing up to 50 pounds Requires ability to consistently perform repetitive … is an equal opportunity employer. All terms and conditions of employment are established without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, pregnancy, genetic information, disability, veteran status, or any other protected category under applicable federal, state, and local laws. More ❯
Position Summary Odyssey is seeking a top notch Information Technology Specialist to support the Naval Medical Research Unit Dayton (NAMRU-D). NAMRU-D is located at Wright Patterson Air Force Base and is Navy Medicine's world class, global aeromedical research leader. Their efforts and innovative products are aligned with operational requirements to solve the naval and … e.g. Remedy) to track all customer requests. Assist in maintaining necessary interface with other Government agencies, industry, and external IT support agencies to remain cognizant of new and existing information technologies and system integration demands and requirements. Provide monthly functional area reports summarizing work accomplished, work planned in next month and important issues occurring during the month. Qualifications Minimum … Required Qualifications: Citizenship: Must be a US citizen Clearance: Ability to obtain a Secret Clearance Education: High School Diploma Years' experience: Minimum of five (5) years experience in information technology. Experience required includes Server management experience/knowledge, and customer service skills. Certifications: DoD 8570 IAT Level II certification OR an equivalent listed below: CCNA-Security CySA+ GICSP GSEC More ❯
We are seeking an individual who can demonstrate appropriate experience of delivering IT services in a fast-moving industrial environment. A position is available at the Filton site for Information Technologies within Operational Technologies (IT in OT) Specialists. You will plan and carry out activities to ensure the information systems inside production assets are well serviced, taking responsibility … for IT deployment, machine software configuration, validation, scheduled maintenance and IT reactive maintenance. As well as the upgrade and disposal of IT business owned software, business owned information systems hardware, business owned IT network devices as well as business owned operating systems. The Filton IT in OT Specialists work flexible day shift pattern on-site and may be required … will have an operational link with the Support Functions that are part of the production team. Your interface will be Production, as users of the industrial assets with the Information Technologies within, co-working with the Industrial Maintenance team and engaging with relevant Digital product managers and support levels within the organisation. You will also liaise with Original Equipment More ❯
Experience in creating and implementing organizational or administrative management policies and procedures • Experience evaluating program effectiveness and recommending improvements • Experience providing training and technical assistance to staff • Experience in information and records management • Excellent written and verbal communication skills • Commitment to innovative and quality customer service • Physical ability to move large numbers of files and/or file boxes … resolve complex problems Qualifications: • At least 10 years of administrative management or relevant work experience • Proficient in IT programs, databases, and computerized systems • College degree required in business or information management and/or related certifications More ❯
on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is currently seeking a proficient Senior Information Technology Specialist to join our dynamic team in support of the Program Executive Office Soldier, focusing on the engineering, building, testing, and deployment of innovative cloud service offerings. … This position works under occasional supervision to plan and perform all aspects of Information Technology (IT) for business, financial, technical services, and other professional services projects. Responsibilities: Support the resolution of IT and system problems, to recommend solutions to higher level IT specialists and management, and to meet assignments as estimated and scheduled. Primarily works on matters of moderate … days EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. More ❯
systems engineering, integration, and advanced technology services to transform the future safety, security, and resiliency of critical missions on the ground, in the air, in space, and in the information systems that connect these domains. Learn more about ENSCO. Position Description ENSCO, Inc. is seeking an Information Technology Specialist (Level 2) to provide direct support to the … technical documentation, risk assessments, and executive-level briefings, as well as providing timely support for cybersecurity incident response and program reporting. Qualifications Required: Bachelor's degree in a related information technology field (may be substituted for 5 years of relevant experience) 15-20 years of experience (Master's Degree may substitute for 3 years; PhD may substitute for More ❯
MELE Associates is seeking a mission-driven Information Technology Specialist to support NEST operations with classified computing and secure communications systems. The successful candidate will provide hands-on technical support for a variety of IT and communications infrastructures in both classified and unclassified environments. This role requires a strong foundation in networking, system security, and operational readiness. ESSENTIAL … office staff with ad hoc troubleshooting on teleconference and general IT issues Support facility network infrastructures and problem resolution. Other duties as assigned MINIMUM QUALIFICATIONS Bachelor's degree in information technology, Computer Science, Engineering, or a related field; or equivalent technical training and experience Minimum of 6 years of experience in IT system administration, networking, or communications system support. More ❯
Job Number: R Information Security Risk Specialist The Opportunity: Cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to government agencies. In all of this "cyber noise," how can these organizations understand their risks and how to mitigate them? The answer is you. We need your knowledge as an … information security risk spe cia list to help break down complex threats into manageable plans of action. As an Information Security Risk Spe cia list on our team, you'll assist Air Force or Space Force organizations with discovering their cyber risks, understanding applicable policies , and developing a mitigation plan. You'll gather technical and personnel details from … security concepts so they can make the best decisions to secure their critical infrastructure a nd mission-critical systems. This is your opportunity to build experience in a strategic information security role while developing skills in AI, cloud computing, and cyber risk analysis. Work with us as we protect our military's communications systems. Join us. The world can More ❯
a focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is seeking a Journeyman Information Assurance Specialist to support cybersecurity operations for TRADOC G2 at Fort Eustis, VA, ensuring the protection and compliance of mission-critical IT systems. The selected candidate will assist … policies. EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. More ❯
This is a contingent opportunity The Information Operations Specialist performs technical communications vulnerability assessments of computer networks, Industrial Control Systems, radio, wireless, and other communication systems that directly support the critical assets on DoD Installations or other agencies' facilities. Duties: Review and provide an assessment of the following: cyber issues and integration employment of the core capabilities of … computer and network hardware components and operating systems. In lieu of a degree, commensurate operational experience may be substituted. Additional Requirements Possess working knowledge of Department of Defense's Information Assurance Vulnerability Alert processes. Mastery level experience working hands-on with Computer Network modeling software. Mastery level experience working hands-on with Computer Network vulnerability/compliance analysis software. … Ability to lift and move object which weigh up to 50lbs. Expert in the performance of in-the-field vulnerability-based assessments in the technical area of Information and CyberSpace Operations. Desired Experience: Experience providing analytical support to one or more special operations forces (SOF) units or commands Tactical or operational level experience operating in a deployed environment Experience More ❯
This position is differentiated from other information system management positions by its limited involvement in programming and systems development; Management Information System is a subset of information systems management. Responsibilities Direct the utilization and management of information and technologies that automate operations for an organization Assure the adequate implementation of enterprise-level technology and contribute to … the security of the information systems, communication lines, and other technical equipment Impel and oversee the development, review, and approval of backup and disaster recovery plans Perform operational risk assessments and implements mitigation solutions Maintain training materials and enable user training on organizational technologies Budget and tracks IT services costs to align spending with organizational objectives Design, deliver, and … continuously improve a comprehensive software strategy and the standard operating procedures for technologies Identify and integrate emerging information technologies to improve the technical processes of an organization Understand and anticipate the needs and requirements of the business to ensure that software and services contribute to business outcomes Develop and maintain service-level agreements with business partners and manages vendors More ❯
We are seeking an individual who can demonstrate appropriate experience of delivering IT services in a fast-moving industrial environment. A position is available at the Filton site for Information Technologies within Operational Technologies (IT in OT) Specialists. You will plan and carry out activities to ensure the information systems inside production assets are well serviced, taking respons More ❯
Job Description: Performs a wide variety of functions designed to modify and maintain the clinical Cardiovascular Information System (CVIS). Responsibilities include software and hardware maintenance; system security; research and analysis of system and organizational needs; auditing system for completeness and accuracy of data; and employee training and competency assessment, and an overall knowledge of CVIS, and EPIC/… Encompass. Work Experience:Minimum of 4 years clinical cardiovascular experience.Experience with Cardiovascular Image and Information Systems. Education Qualifications: Graduate of an accredited Cardiovascular Technology Program. Licensure/Certification Qualifications: No certification/licensure required. Employee Benefits at Essentia Health: At Essentia Health, we’re committed to supporting your well-being, growth, and work-life balance. Our comprehensive benefits include More ❯
an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/Assurance Specialist II Location: Colorado Springs, CO Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s) assigned. Maintain file servers, Firewalls … checklist. Review and provide technical and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration. Provide External InformationMore ❯
an exceptional group of Government contracting professionals. gTANGIBLE is in the process of identifying candidates for the following position. Requisition Type: Contingent - Open Position Status: Full Time Position Title: Information Technology/Assurance Specialist II Location: San Antonio, TX Security Clearance Level: Top Secret/SCI, SAP Information eligible, consent for Counterintelligence polygraph Duties and Responsibilities The … agencies, such as HQ Air Force, Office of the Secretary of Defense (OSD) and Military Compartments efforts. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Duties include the following: Establish complex operational software configuration controls and system interfaces for computer system(s) assigned. Maintain file servers, Firewalls … checklist. Review and provide technical and cyber security coordination on all Bodies of Evidence that make- up the authorization package. Identify any and all vulnerabilities and implement countermeasures. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. Perform Video-Teleconferencing VTC System Administration, Scheduling, & Configuration. Provide External InformationMore ❯
Title: Information Technology Customer Support Specialist Belong. Connect. Grow. with KBR! KBR's National Security Solutions team provides high-end engineering and advanced technology solutions to our customers in the intelligence and national security communities. In this position, your work will have a profound impact on the country's most critical role - protecting our national security. Why Join … computer hardware and software or security administration. Monitors high traffic ticket queue to work towards, and meet, defined team Service Levels. Leveraging excellent written skills, collects and documents necessary information for issue escalation as necessary to appropriate support teams. Supports and is responsive to assist peers and lower-skilled employees as a part of a collaborative team effort. Performs … to you. Provides first contact resolution technical support via incoming phone calls, to customers with questions regarding account administration, distribution or issues with hardware, software, and security administration. All information reported is well documented within the ITSM tracking tool. To meet agreed upon objectives, 90% of all incoming calls should be answered within 20 seconds, requiring high availability time More ❯
Overview Information technology specialists are responsible for maintaining, processing and troubleshooting military computer systems/operations. Job Duties Maintenance of networks, hardware and software Provide customer and network administration services Construct, edit and test computer programs More ❯
positions that could easily transition over to a full-time regular and permanent job with HII. Program Of Instruction For this internship, the SkillBridge intern will train as an Information Technology Analyst within HII-Mission Technologies, reporting to a designated HII Supervisor, with the goal of refining and enhancing current Information Technology Analyst fundamentals and principles. The intern … Preparation of required network cyber (IA) documentation Week 19: Developing SOPs, and implementing audits, threat and vulnerability assessments, and applying security-related software tools to manage and control classified information systems Week 20: Resolving information systems security incidents Additional Goals Project management Minimum Qualifications Active-Duty Military ONLY within final 180 days of active-duty service to actively … Degree in a related field, and a minimum of five (5) years' experience maintaining IT systems or a minimum of ten (10) years' experience maintaining IT systems. DoD 8570 Information Assurance Management Level II certification, or equivalent, and 4 years of classified information systems experience working on DoD ACAT I, ACAT II, or ACAT. Physical Requirements Physical Requirements More ❯
and leadership during and after incidents and s upport internal training and awareness initiatives based on real-world incident scenarios. WHAT YOU OFFER master's degree in computer science, information technology, or a related field, with 2-3 years of professional experience in cybersecurity expertise in operative cybersecurity, including threat detection and system hardening as well as experience in … answer your questions for this position. You are also welcome to book an (technical questions cannot be answered in this appointment) You can also reach our recruiting team First information about our application process can be found ABOUT US Learn more about BASF Coatings GmbH at Diversity is our greatest strength! Become a part of our winning formula for More ❯
focus on collaboration and innovation. Our teams are at the frontier of the Nation's most complex and rewarding challenges. Join our team. Barbaricum is currently seeking a proficient Information Technology Analyst to join our dynamic team in support of the Program Executive Office Soldier, focusing on the engineering, building, testing, and deployment of innovative cloud service offerings. Responsibilities … Directly support the PEO Soldier Chief Information Officer (CIO) and manages the day-to-day Information Technology and Communications functions for the Headquarters. Perform day-to-day Information Management Officer (IMO) duties outlined in DA-PAM 25-1-1, paragraph 6-4 and is the functional liaison to the Network Enterprise Center - Fort Belvoir (NEC-FB). … days EEO Commitment All qualified applicants will receive consideration for employment without regard to sex, race, ethnicity, age, national origin, citizenship, religion, physical or mental disability, medical condition, genetic information, pregnancy, family structure, marital status, ancestry, domestic partner status, sexual orientation, gender identity or expression, veteran or military status, or any other basis prohibited by law. More ❯
including IAVs, TASKORDs, FRAGORDs, etc. Create, implement and maintain system baselines. Conduct technical security test and evaluations of unclassified networks and/or systems to determine compliance with appropriate information assurance (IA) or cyber security controls and risk mitigation strategy. Provide detailed risk mitigation recommendations; conduct risk and vulnerability assessment of IT systems; conduct appropriate network scans utilizing ACAS More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerability management, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into … system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and update RMF documentation, including security assessment reports and plans of action and milestones Utilize eMASS to track and manage RMF requirements Develop and implement … Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information Assurance tools such as ACAS, performing remediation, and deploying required updates Experience evaluating the security of new system designs and developing cybersecurity solutions for networking systems May be required More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerability management, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into … system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and update RMF documentation, including security assessment reports and plans of action and milestones Utilize eMASS to track and manage RMF requirements Develop and implement … Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information Assurance tools such as ACAS, performing remediation, and deploying required updates Experience evaluating the security of new system designs and developing cybersecurity solutions for networking systems Desired Qualifications Experience More ❯
San Diego, California, United States Hybrid / WFH Options
Noblis
will bring strong expertise in Risk Management Framework (RMF), security scanning, vulnerability management, and cybersecurity compliance to enhance the security posture of naval tactical network systems. Key Responsibilities Perform Information Assurance (IA) scans to identify vulnerabilities and verify RMF compliance Monitor Information Assurance Vulnerability Alerts (IAVAs), Security Technical Implementation Guides (STIGs), and other cyber vulnerabilities for integration into … system design Provide endpoint detection and response solutions to enhance system security Support testing and evaluation of Information Assurance solutions Develop comprehensive test plans, conduct detailed security testing, and produce thorough test reports Create and update RMF documentation, including security assessment reports and plans of action and milestones Utilize eMASS to track and manage RMF requirements Develop and implement … Management Framework (RMF), including creating and updating documentation, using eMASS to meet RMF requirements, and developing mitigation strategies for system vulnerabilities Experience conducting security scans (e.g., STIG, IAVA) using Information Assurance tools such as ACAS, performing remediation, and deploying required updates Experience evaluating the security of new system designs and developing cybersecurity solutions for networking systems Desired Qualifications Experience More ❯
Citizenship LOCATION: Fort Eisenhower, Georgia Position Description: Will provide specialized in the analysis or application of system security practices within an organization/agency. Assists the system owner and Information System Security Officer (ISSO) in varies aspects in developing and writing certification and accreditation (C&A) documentation packages included in the process of helping an organization/agency obtain … with commonly used tools, concepts, practices, and procedures Functional Responsibility: Provides the analysis or application of system security practices within an organization/agency. Assists the system owner and Information System Security Officer (ISSO) in varies aspects in developing and writing certification and accreditation (C&A) documentation packages included in the process of helping an organization/agency obtain More ❯