SECURING OUR TECHNOLOGY The Air Force relies heavily on advanced computer and software systems, so it is paramount to keep those systems safe. It’s the job of Cyber Systems Operations specialists to design, install and support our systems to ensure they operate properly and remain secure from out...
As a CTI, you may work independently or as part of small, coordinated teams - ultimately under the supervision of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required). ...
Each CT role works under the oversight of Cryptologic Warfare Officers (four-year degree required) or Cyber Warfare Engineers (four-year degree required) – and potentially both. As a CT, you may work independently or as part of small, coordinated teams – ultimately under the supervision of Inform...
An OEM is looking for Network engineers to join their team at various manufacturing facilities across the US. Manufacturing Cyber Security Engineer. Wireless networking/troubleshooting/documentation experience (Wireless Access Points/wireless channel experience). Drives cybersecurity and network ...
We are currently seeking an experienced IT Cyber Security Operations Analyst with patching experience, to work in a full-time hybrid role requiring both remote work and onsite work at a client ...
With offices throughout the United States, we are a premier cyber and physical security specialty contractor, and we are growing at a rapid pace. We have a wide range of talented and experienced ...
We have more junior roles for exceptional individuals with a proven personal interest an engagement in cyber attack and defence, and outstanding academic and career performance even if experience is ...
This global leadership role in cyber security is to manage the Security Operations (SecOps) team responsible for design, implementation and evolution of Canonical security practices, techniques ...
Identify and track targeted intrusion cyber threats, trends, and new developments by cyber threat actors through analysis of proprietary and open source datasets * Collaborate across teams to inform ...
Interpret internal or external cyber security risk analyses in business terms and recommend a responsible course of action * Develop templates and materials to help with self-service risk management ...
They will also develop students' 21st Century digital literacy skills (i.e. coding), Cyber Security and STEM Knowledge. Computer Technology Instructors must have an extensive knowledge of computer ...
Communicate with IT Manager to understanding all cyber-threats, and serve as a resource to all staff in taking preventative, hardening, and reactive measures * Create and update policies and ...
Company Description Since 1982, Dox has been providing Cyber Security Consulting, Professional IT Support, and Security Assessments for organizations of all sizes across the United States. Time and ...
Ability to manage multiple projects from start to completion Company Description Since 1982, Dox has been providing Cyber Security Consulting, Professional IT Support, and Security Assessments for ...
You and your team will make sure our Linux distribution and products, as well as ways of working, are supporting standards addressing processes, cyber-security and safety concerns such as described ...
Our team advises on the full spectrum of insurance coverage issue areas, including general liability, excess/umbrella, professional, pollution, cyber, auto, property, builders' risk, employee ...
Flexible Spending Account (FSA) program * 401K program * 3% Safe Harbor 401K plan without employee matching contributions Company Description Since 1982, Dox has been providing Cyber Security ...
Participates in various projects designed to improve the defensive posture of the entire organization. These projects may include mitigation of audit or penetration test findings, policy reviews, or ...
... quality and assurance for IAM solutions * Follow applicable federal agency guidance on IAM ... Analyze current/future IAM vendors, hardware, software, etc. that may be introduced to modernize ...
We are currently hiring a Lead Cyber IAM (Identity & Access Management) in our Program Management Services division at our client’s Rochester office (hybrid work week - 3 days in office with a possibility of full time in office). Lead, develop, maintain, and write IAM cybersecurity policies, rul....
Negotiable, dependent on experience.A leading, global managed services and professional security consultancy organisation has identified a business critical opportunity out of NYC, for an experienced Digital Solutions Architect.The Digital Solution Architect (DSA) is responsible for the definitio...