Medical/Dental/Vision: company funded, cash incentives if you waive. Demonstrated experience analyzing, evaluating, designing and recommending network and……
A security engineer with software development & systems engineering experience is essential for supporting initiatives to develop, implement, and document……
Experience implementing RMF Process and NIST 800-53 technical controls, as well as developing and maintaining associated certification and accreditation……
Bachelor’s degree preferred, in computer Science, Information Systems, Engineering, Business, or a scientific of technical discipline related to the specific……
Provide technical analysis and supporting information through cybersecurity risk management activities such as: categorize an information system, select……
Excellent communication skills with the ability to effectively collaborate with both technical and non-technical stakeholders. Job Types: Permanent, Full-time.…
You will work closely with cross-functional teams to design, implement, and manage comprehensive security solutions. US Citizenship (required for this role).…
Knowledge of security technologies, including firewalls, IDS/IPS, SIEM tools, and vulnerability scanning tools. *MUST HAVE government agency experience*.…
Facilitate using tools or SOFTWARE methodologies to review, design and implement products and services. Communicate the IAM aspects of both the production……
BS/MS degree in Cybersecurity, Information Technology, or a related field. Proven experience in conducting cybersecurity risk assessments and developing risk……
That’s why we need you, an electrical engineer, with an understanding of embedded system design, mobile platforms and architecture, and hardware security……
Supinf Technologies, LLC (www.supinf-tech.com) provides strategic planning, systems engineering, and technical analysis support to the US Space Force (USSF) in……
Insider Threat Analysts triage data of anomalous events collected by User Activity Monitoring (UAM) Tools, and other data analytics tools and sources to……
IAM Level III compliant certification e.g. CISM, CISSP, GSLC, or CCISO. Conduct risk assessments and investigations, execute appropriate risk mitigations, and……
Training on key inventory processes involving key processor devices in the field, like the SKL and RASKL, and secure data transfer devices including the Sypris……
That’s why we need you, an electrical engineer, with an understanding of embedded system design, mobile platforms and architecture, and hardware security……
Setting a vision and strategy: Develop and execute a future vision for ATT&CK’s CTI work and output (e.g., recent release of Campaigns) and, in coordination……
Bachelor or Graduate degree in a technical field such as Engineering, Physical Science, Computer Science, Information Science, Mathematics or a related field.…
Mastery in at least one Security certification from AWS, Azure, or GCP: Extensive experience as an ISSO in high-security settings, a minimum of 7 years in……
Other paid leave includes military leave, jury duty leave, bereavement leave, voting and election official leave for federal, state or local primary and general……
Transitioning military members, veterans, and their spouses are encouraged to attend. Many participating employers require U.S. citizenship and/or cleared (or……
For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on……