to keep the threats at bay. Analyzes user's requirements, concept of operations documents, and high level system... and synthesis from system level to individual software components. Must have demonstrated experience working with Java and/or C...
Data Protection System Engineer Level 2 Position Summary DarkStar is searching for a Data Protection System Engineer... systems engineering, particularly in data protection within a zero-trust enterprise, and specialized knowledge of Varnish...
SCRM Systems Engineer Level 2 Position Summary DarkStar is seeking a Systems Engineer based in Laurel, Maryland... chain operations. Manage system requirements to ensure production systems meet the defined system architecture...
data protection/classification requirements. Builds IA into systems deployed to operational environments. Assists... DoD 8570 compliance with IASAE Level 2 is required. Benefits PTO: Our variable PTO plan lets you decide the amount...
system or network designs that encompass multiple enclaves, to include those with differing data protection/classification...: Information Systems Security Engineer Level 1: Seven (7) years’ experience as an ISSE on programs and contracts of similar scope...
system or network designs that encompass multiple enclaves, to include those with differing data protection/classification... from an accredited college or university is required. DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification...
protection of data and secure system configuration. The ISSE supports the implementation of security policies and solutions...Information System Security Engineer (ISSE) Omega Enterprise Solutions is a Maryland-based, Service-Disabled Veteran...
or network designs that encompass multiple enclaves, to include those with differing data protection/classification requirements..., computing, and enclave environments. General Qualifications: 14 years of IA System Architect and Engineer (IASAE...
that encompass multiple enclaves, to include those with differing data protection/classification requirements Recommend system.... DoD 8570.01-M compliance with IASAE Level 2 is required CISSP Certification is required. A “TS/SCI with Poly...
, and System Engineers. The Level 2 Information Systems Security Engineer (ISSE) shall perform, or review, technical security... system or network designs that encompass multiple enclaves, to include those with differing data protection/classification...
system or network designs that encompass multiple enclaves, to include those with differing data protection/classification... requirements and recommend system-level solutions to resolve security requirements. Requirements Active Top Secret//SCI...
Culture Open-Door Leadership Growth Opportunities Information Systems Security Engineer (ISSE) Annapolis Junction, MD... Full Time Contractor - ONSITE Experienced Description: The Information Systems Security Engineer shall perform...
security requirements for the protection of data, to ensure the implementation of appropriate information security controls... security requirements for the protection of data to ensure the implementation of information security policies, activities...
-shelf (GOTS) in place of new development, and requirements analysis and synthesis from system level to individual software... and a finalist in 2021! Belay Technologies is seeking a Software Engineer (SWE) to join our intel team. The SWE develops, maintains...
, operating system (OS) and/or application level support for systems and/or tools), environment discovery, cybersecurity... qualified Sr. Cybersecurity Engineer candidates to join our Defense Enclave Services team who will support an extensive digital...
, operating system (OS) and/or application level support for systems and/or tools), environment discovery, cybersecurity... qualified Sr. Cybersecurity Engineer candidates to join our Defense Enclave Services team who will support an extensive digital...
. Perform system or network designs that encompass multiple enclaves, to include those with differing data protection... and with differing data protection/classification requirements. Build Cybersecurity into systems deployed to operational environments...