Skip to content
  • Senior Security Systems Engineer

    Responsibilities include but are not limited to: Define, plan, design, and evaluate information security systems  with the following: Provide solutions for and implement Risk Management Framework (RMF) security controls Perform requirements analysis, design, and integration for complex software ap.......

  • Senior CERT Analyst

    Responsibilities include, but are not limited to: Provides leadership and high level Systems Security Support managing tool cyber activity. Performs security event and incident correlation using information gathered from a variety of sources within the enterprise. Performs cyber incident triage to.......

  • Access Identity NICO Engineer

    Responsibilities include, but are not limited to:  Deploys Enterprise NICO solutions supporting Identity Access and Credential Management.  Engineers and deploys capabilities to provide new functionality, improve system performance/availability, and for generating efficiencies in the maintenance .......

  • Cyber Security Threat Engineer

    Responsibilities include, but are not limited to: Provides leadership and high level CSOC Security Support managing  cyber and network incidents and warning activity. Performs security event and incident correlation using information gathered from a variety of sources within the enterprise. Pe.......

  • Information System Security Engineer (ISSE)

    Summary The successful candidate will support overall network defense activities, provide in-depth analysis of suspected malicious code and/or infected systems and network devices, perform necessary inspection and reverse-engineering activities to understand the behavior of software, determine the r.......

  • Infrastructure O&M Administrator

    Position Description Responsible for day to day operations and maintenance of a wide variety of Cyber Support tools, such as  ArcSight SIEM, network and host-based (HBSS) Intrusion Detection Systems (IDS), Intrusion Protection Systems (IPS) and their associated architectures.  Proactively monitor .......

Page:
Back to top