1 to 15 of 75
Sort by: Date | Relevance
The Senior Information Systems Security Officer (ISSO) will support a government agency in the achievement of strategic goals and objectives related to the ongoing execution and maturity of its cybersecurity and assessment and authorization (A&A) programs. The ideal candidate is a detail oriented, self starter who thrives in fast paced environments, enjoys working indepen
Posted 1 day ago
The Security Operations Center (SOC) was established in accordance with the Federal Information Security Management Act (FISMA) and the Homeland Security Presidential Directive (HSPD) 7 as a single point of management and reporting for information security incidents. The SOC is chartered to prevent, identify, contain, and eradicate cyber threats to the clients networks th
Posted 1 day ago
We are currently seeking several talented Java Software Engineers to support an Agency level Advanced Cyber Analytics team. This program provides targeted threat monitoring and response capabilities related to security event monitoring, incident response, malware analysis and reverse engineering, cyber intelligence, and insider threat. The positions will focus on custom d
Posted 1 day ago
XOR Security, An Agile Defense Company is currently seeking a talented Senior Software Developer to support an Agency level Cybersecurity Program with the development of a Power BI end to end data visualization tool. The ideal candidate is self motivated and detail oriented with a passion for data analytics and transforming raw data into actionable information for leaders
Posted 1 day ago
The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise wide information systems, and collects,
Posted 1 day ago
XOR Security, an Agile Defense Company is currently seeking a talented Senior Network Security Engineer to support Agency level Cybersecurity Program to streamline the current Architecture and Engineering approach with a focus on roadmap planning. The ideal candidate enjoys activities defined to be "as is" and "to be" architectures including the business, data, applicatio
Posted 1 day ago
The primary objective of the SOC is to protect the government agency's critical information infrastructure. To do this, the SOC must 1) Reduce Exposure to Cyber Risk; 2) Ensure Priority Response and Recovery to cyber threats/incidents; 3) Maintain Shared Situational Awareness of cyber threats, vulnerabilities, and incidents; and 4) use trustworthy cyber protocols, product
Posted 1 day ago
Agile Defense is currently seeking a talented Penetration Tester to support an Agency level Focused Operations Advanced Cyber Analytics team at DHS. This program provides targeted threat monitoring and response capabilities requiring analysts to have advanced levels of experience in security event monitoring, incident response, malware analysis and reverse engineering, cy
Posted 1 day ago
The Security Operations Center (SOC) is a U.S. Government program responsible to prevent, identify, contain and eradicate cyber threats to the DHS's networks through monitoring, intrusion detection and protective security services to DHS's information systems. The SOC is responsible for the overall security of the clients Enterprise wide information systems, and collects,
Posted 1 day ago
The SOC program provides comprehensive Computer Network Defense and Response support through 24O7O365 monitoring and analysis of potential threat activity targeting the enterprise. SOC Analysts will conduct security event monitoring, advanced analytics and response activities in support of the CND operational mission. To support this vital mission, XOR staff are on the fo
Posted 1 day ago
Agile Defense Company is currently seeking a talented Identity Credential Access Management (ICAM) Lead to support an Agency level cybersecurity program through the evolution of their long time ICAM solution. Your primary responsibility is coordinating an enterprise approach to ICAM and delivering technical solutions that centrally manage digital identities, credentials,
Posted 1 day ago
Work according to forensic lab processes and procedures uniformly and comprehensively. Support case load and assist with forensic analysis and reporting of case workload when required. Discover data applicable to legal proceedings such as litigation, government investigations, or Freedom of Information Act (FOIA)requests, where the information sought is in electronic form
Posted 1 day ago
Agile Defense is actively seeking a Cyber Threat Intelligence Analyst with background experience on People's Republic of China (PRC) to apply their technical and analytic expertise to evaluate advanced and emerging cyber threats targeting Federal Departments and Agencies (D/A) and National Critical Functions (NCF). JOB DUTIES AND RESPONSIBILITIES The selected candidate wi
Posted 1 day ago
Joint Interoperability Test Command (JITC) Test, Evaluation and Certification II Services (TEC II) contract provides Information Technology/National Security Systems (IT/NSS) T&E support and services that test and evaluate critical strategic and tactical IT/NSS systems and capabilities that support DoD day to day operations. JITC is one of DoD's Operational Test Agency (O
Posted 1 day ago
Joint Interoperability Test Command (JITC) Test, Evaluation and Certification II Services (TEC II) contract provides Information Technology/National Security Systems (IT/NSS) T&E support and services that test and evaluate critical strategic and tactical IT/NSS systems and capabilities that support DoD day to day operations. JITC is one of DoD's Operational Test Agency (O
Posted 1 day ago
Email this Job to Yourself or a Friend
Indicates required fields