range of factors, including but not limited to skill sets, experience and training, security clearances, licensure and certifications...Job Family: Cyber Consulting Travel Required: None Clearance Required: Active Top Secret (TS...
. Understanding of security (cyber and physical) practices, as applicable to election technologies. Education Bachelor...Summary The purpose of Election Assistance Commission's (EAC) Voting System Testing and Certification Program...
the Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem..., Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem to protect... Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem to protect..., Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Infrastructure team ensuring optimal performance and delivery. This includes training, mentoring, and leading the team, managing... those for architecture, security, disaster recovery, standards, purchasing, and service provision. Collaborate with the information security...
solutions for global security, clean energy, environmental restoration, nuclear medicine and space exploration. With more than... OpEds / thought leadership pieces for company leadership. Maintain and administer media training materials to selected...
Ability to work independently in a fast-paced environment with competing priorities. Technical IT and cyber security background... 8510.01. A high school degree, or a GED, and more than twenty (20) years of relevant experience in cyber security, information system...
) and cyber security authorization processes Familiarity and experience with Microsoft technologies (M365, Power Platform... our team, you could help C-suite and program leaders transform their organization and accelerate mission execution through...
Framework (RMF) efforts, and sustainment data cyber activities. Join a leading company with over 40 years in the industry... security into the development lifecycle and ensuring continuous monitoring and assessment. Contribute to MBSE efforts...
solutions for global security, clean energy, environmental restoration, nuclear medicine and space exploration. With more than... OpEds / thought leadership pieces for company leadership. Maintain and administer media training materials to selected...
customers to preserve national security, deliver justice and serve the public with advanced technologies and quality analysis... latest end-to-end cloud infrastructure, big data and cyber capabilities. Our expertise in cross-domain and boundary solutions...
customers to preserve national security, deliver justice and serve the public with advanced technologies and quality analysis... latest end-to-end cloud infrastructure, big data, and cyber capabilities. Our expertise in cross-domain and boundary...
and artifacts. The architect will accomplish this by collaborating with stakeholders, including the cyber security and privacy, CPIC..., Datacenter As-Builts, updated cabling diagrams, security services, ICAM, and vulnerability management. He/she will create...
This is a hybrid opportunity. Following an initial two month in-person training period, candidates may work remotely 2... function will be to support a federal law enforcement client’s criminal investigative high-tech organized crime (HTOC) program...
and artifacts. The architect will accomplish this by collaborating with stakeholders, including the cyber security and privacy, CPIC..., Datacenter As-Builts, updated cabling diagrams, security services, ICAM, and vulnerability management. He/she will create...
of Strategy, Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information... Division (CSD). CSD leads the Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the...
Job Family: Cyber Consulting Travel Required: None Clearance Required: Active Secret... with evolving and maintaining the Department’s cybersecurity risk management strategy, risk assessment methodologies, training...
designed to collect and centralize logs Experience working with LogStash or other cyber security tools in a Linux environment... to pursue innovation Wellness & Fitness Program Valiant University – Online Education and Training Portal Reimbursement...
status Yes Security clearance Drug test Yes Position sensitivity and risk Trust determination process Financial... enterprise’s technology systems and products. Oversees program management and product operations requirements for target...