Skip to content
Cyber Risk Assessor The Opportunity: Warnings about cyber threats are everywhere, and the constantly evolving nature of these threats can make understanding them seem overwhelming to government agencies. In all of this "cyber noise," how can these organizations understand their risks and how to mitigate them? The answer is you-a lead information security risk specialist who can break down complex threats into manageable plans of action. As an information security risk specialist on our team, you'll consult for the client leading the discovery of their cyber risks, understanding policies, and... more ->
Description Are you looking for an opportunity to utilize your technical skills to solve complex, real-world problems? Are you passionate about designing and securing systems against advanced threat? If so, we're looking for someone like you to join our team at APL. Our team has an immediate need for a skilled Systems Integrator to lead software development and integration efforts associated with deploying a complex US Navy system. The ideal candidate for this role has an extensive software development background and demonstrated ability to lead high production teams. This position requires... more ->
It's an exciting time to be a member of the Fisher Investments Technology Department. We're investing in the future of our firm's technology and are building our team to achieve global growth. We are looking for a Senior CyberArk Security Engineer to support our Corporate Systems team. If you are looking for an opportunity to make a difference as we develop scalable and strategic solutions to support our global growth, we want to hear from you! The Opportunity: The Senior CyberArk Engineer/SME/Scripter implements, coordinates, migrates, and onboards all aspects and phases of the CyberArk's... more ->
Description Do you enjoy applying next generation voice and video technologies to challenging security problems and ensuring our nation's defense? Are you passionate about developing and mentoring technical teams? If so, we're looking for someone like you to join our team at APL! We are seeking an innovative network engineer to help us develop communications systems used to deliver key communications and teaming capabilities to our nation's decision makers. You will become part of a dynamic team comprised of seasoned engineers and skilled analysts, collaborating to design and deploy new Real... more ->
Duties and Responsibilities: The Zero Trust project manager will excel at building and communicating security modernization strategies that enables USCENTCOM to stay at the cutting edge. The position requires the ability to provide guidance on how to architect/design, leverage, and operate, various operational platforms, including Identity, Credential, Access Management (ICAM), Security Information and Event Management, and Security Orchestration, Automation & Response (SIEM/SOAR), and Privileged Access Management solutions as well as be a catalyst to accelerate capabilities for an integrated... more ->
Join GDIT's Intelligence and Homeland Security (IHS) CTO organization and help drive the technical solutions needed to win our most complex and strategic deals. As the Director, Solutions Architect for the IHS Chief Technology Office and manage the development of solutions for proposals in the Intelligence market space. The candidate will directly interface with internal and external clients on a pre-proposal basis. Candidate will analyze RFI and RFP requirements and develop responsive solutions including staffing and other costs, review solutions developed by others, present solutions to... more ->
Title : Senior Systems Administrator Clearance Required: TS/SCI Location: USA FL Doral - 9301 NW 33rd St (FLC022) Please take this opportunity to join one of GDIT's fastest growing and long-standing programs! US Battlefield Information Collection and Exploitation System Extended (US BICES-X) is a cutting-edge program supporting DoD intelligence information sharing on current and emerging global threats to mission and coalition partners and emerging nations. With an internationally dispersed team supporting each combatant command, the US BICES-X team is in direct support of the war fighter and... more ->
*We are unable to sponsor as this is a permanent Full time role*.Hybrid 3 days onsite 2 days remote* A prestigious company is looking for an IT Security GRC Specialist. This specialist will be the SME for information security GRC and will perform key risk management functions within the security governance department. They will do 3rd party vendor risk management and internal risk management. Experience with frameworks ISO 27001, NIST, SOC, SIG is required. Responsibilities: Management of process improvement, control maturity, and communication of risk throughout assigned GRC service... more ->
The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Cybersecurity Risk Management and Compliance, including Cybersecurity Risk Management Lead, Cybersecurity Governance Team Lead, Senior Risk and Compliance Program Manager, Cybersecurity Risk Consultant, Risk Assessment and Compliance Manager. All positions are in the DHS Cybersecurity Service. DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the... more ->
The Department of Homeland Security (DHS) is recruiting professionals to support a range of technical roles in Cybersecurity Threat Analysis, including Cybersecurity Intelligence Analyst, Cybersecurity Threat Analyst, and Cybersecurity Adversary Analysis Expert. All positions are in the DHS Cybersecurity Service. DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the ongoing need for cybersecurity talent, DHS-CS uses "Talent Pools" to pull qualified... more ->
The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Cybersecurity Threat Analysis, including Cybersecurity Threat Manager, Cybersecurity Threat Intelligence Branch Chief, and Deputy Section Chief Adversary Analysis. All positions are in the DHS Cybersecurity Service. DHS Cybersecurity Service (DHS-CS) uses a multi-phase assessment process to qualify applicants seeking employment through the DHS-CS. Given the ever-advancing nature of cybersecurity and the ongoing need for cybersecurity talent, DHS-CS uses "Talent Pools" to pull... more ->