1 to 15 of 22
Sort by: Date | Relevance
include, but are not limited to The Regional Cyber Center Conus (RCC C) program is seeking a Program Manager to lead the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona. The RCC C pushes the boundaries of innovation and security, while providing high availability network services for the Army to accompl
Posted 3 days ago
include butare not limited to Provides ongoing network support, addresses availability issues, overcomes performance problems, and provides overall level two support Designs, installs, maintains, and coordinates the use of network systems Evaluates hardware and software and peripheral equipment for large, complex networks Manages network performance, diagnoses performance
Posted 3 days ago
include, but are not limited to Ensure the day to day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS Provide liaison support between the system owner and other IS security personnel Ensure that selected security controls are implemented and operating as intended during all phases of the
Posted 3 days ago
include, but are not limited to Directly contribute to program efforts in several areas, including cost management/avoidance, schedule estimation and tracking, contract performance management, risk management, requirements analysis, and quality assurance activities. Ensure proper performance of tasks necessary to ensure the most efficient and effective execution of the con
Posted 6 days ago
DHS Background Investigator (FT Employee) Yuma, AZ Job Locations US AZ Yuma Requisition ID 2024 145993 Position Category Investigation Clearance RDG Clearance Sector Defense Mission & Health Solutions Responsibilities We are currently seeking to fill a critical role for a full time DHS Credentialed Background Investigator in the area of Yuma, AZ . The Background Investiga
Posted 10 days ago
include, but are not limited to A qualified candidate will be responsible for maintaining the overall CM process and baselines for hardware and software product build, staging, testing, integration, and operations Work with operations and maintenance teams to create and maintain configuration baselines supporting operational networks Implement hardware and software version
Posted 12 days ago
Peraton
- Fort Huachuca, AZ
include, but are not limited to The Regional Cyber Center Conus (RCC C) program is seeking a Deupty Program Manager to assist on leading the Department of Defense Information Networks (DoDIN) and Defensive Cyber Operations(DCO) teams in Fort Huachuca, Arizona. The RCC C pushes the boundaries of innovation and security, while providing high availability network services for
Posted 12 days ago
include butare not limited to Principal Active Directory Subject Matter Expert (SME) will support our enterprise Active Directory environment serving critical programs with classified information system capabilities Success in this role means you can architect, design, deploy, secure, maintain, and troubleshoot the Active Directory environment across various classified pro
Posted 12 days ago
include, but are not limited to Designs, develops, and implements cloud based solutions Designs cloud architecture and completes plans and specifications to develop solutions Collaborates with product managers and engineers to develop specifications for new cloud based products/services, applications, and solutions Drives the roll out of cloud management platforms, evaluat
Posted 12 days ago
include, but are not limited to Analyzes, maps, protects, or discovers vulnerabilities, intrusions, and threats in various computer network systems Conducts computer and/or network security, target development, and understands all aspects of computer/network security to include firewall administration, encryption technologies, and network protocols Reports events or incide
Posted 12 days ago
include, but are not limited to Applies ITIL experience in performance analysis and development of existing processes, procedures and methods to promote effective business and systems operations through standardization, improvement, simplification and discontinuance Provides ITIL subject matter expertise to develop, improve, integrate, measure, and report on operational pr
Posted 12 days ago
include, but are not limited to Leads and participates in the evaluation and analysis of complex malicious code through the utilization of tools, including dissemblers, debuggers, hex editors, un packers, virtual machines, and network sniffers Responsible for providing findings in a technical report with details of the malware, identification parameters, advanced capabilit
Posted 12 days ago
include, but are not limited to Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentation to facilitate mitigations oncustomer systems Perform daily cyber threat research and present findings to the organization to maintain knowledge of current adversary tactics, techniques andprocedures and how to apply them. Br
Posted 12 days ago
include, but are not limited to Utilize off ensive toolsets such as Metaspolit and Kali Linux to safely analyze and penetration test production networks and systems, documenting steps and procedures to produce usable vulnerability assessments for the customer Identify and investigate vulnerabilities, asses exploit potential, and document findings and remedies for presentat
Posted 12 days ago
include, but are not limited to Provides leadership and management to the execution, definition, and strategy of enterprise applications technology projects Responsible for the end to end management of one or more medium to large sized, moderately to highly complex software development projects within the IT and operating departments Responsible for scoping, planning, exec
Posted 12 days ago
Email this Job to Yourself or a Friend
Indicates required fields