1 to 10 of 10
Sort by: Date | Relevance
Ability to process and track system and account access requests Provide updates to SPAWAR leadership on the status of current and upcoming actions Ability to multitask with dozens of actions simultaneously Ability to maintain project schedules and complex tasks Ensuring completion of actions weekly Experience with tracking, updating, reviewing and submitting various government documents Must be ab
Posted 4 days ago
Candidate will correspond with the Defense Health Agency, Military Health Systems Application Program Offices, Chief Information Officers at Military Treatment Facilities and the Network Security Operations Center Cyber Security Service Provider (CSSP) teams to ensure timely documentation & compliance reporting necessary for the accomplishment of the CSSP's mission. Position requires a technical f
Posted 1 month ago
Provide Risk Management Framework (RMF) support to a DoD program undergoing an ATO DIACAP to RMF transition. Work with program and Cyber Security leadership to develop RMF security artifacts, respond to controls, create/update POA&Ms, attend and participate in A&A activities and status meetings. Active participation in providing resolution to Authorization to Operate (ATO), Risk Management Framewo
Posted 2 months ago
Cyber Insider Threat Analyst shall conduct technical analyses of user activity data and alerts to identify indicators of insider threats. In addition to producing investigative leads, analysts are expected to review data pursuant to directed requests in support of civil, workplace, counterintelligence, or law enforcement inquiries/investigations. Analysts shall compile results of analyses into rep
Posted 2 months ago
Managing and sustaining ACAS objects (Repositories, Asset Lists, Scan Zones, Security Center, Nessus Scanners). Analyzing scan and vulnerability compliance. Assisting ACAS users with credentialed scan issues. Reviewing/submitting POA&Ms for past due Information Assurance Vulnerability Alerts/Bulletins. Performing routine and ad hoc scans using the ACAS solution. Analyzing vulnerability scan result
Posted 2 months ago
Identify and exploit security vulnerabilities in a wide array of systems in a variety of situations Thoroughly document all activities conducted on customer networks Create post assessment reporting that describes findings and their risks, exploitation procedures, and remediation's. Potentially assist customers with mitigations of findings Maintain current knowledge of security vulnerabilities, to
Posted 2 months ago
Execute, draft, edit, and maintain standard operating procedure (SOP) documentation. Maintain existing NSOC Incident Response SOP ensure associated documentation and capabilities remain compliant with CJCSM 6510.01A and other applicable policy directives Ensure incidents are properly entered into appropriate automated reporting systems Provide coordination of significant incidents with USCYBERCOM
Posted 2 months ago
Manage SQL Server databases through multiple product life cycle environments, from development to mission critical production systems Configure and maintain database servers and processes, including monitoring of system health and performance, to ensure high levels of performance, availability, and security Ensure development and implementation support efforts meet integration and performance expe
Posted 2 months ago
The Computer Operator II (CO II) shall perform duties as assigned such as Imaging assets, Adding & Removing systems from the site OU in Active Directory, Issuing Bit locker Recovery Keys, and Utilization of the Remedy ITSM Ticket System to manage end user Tickets. The COII may also perform basic IT tasks such as setting up new systems, copying user data, troubleshooting basic issues and elevating
Posted 5 months ago
Development of puppet manifests for providing configuration management of deployed Red Hat Enterprise Linux (RHEL) systems Research and development for solutions to upcoming requirements for system availability monitoring and statistical analysis software Development of migration strategy from current Postfix based email system to Zimbra Deployment of RHEL based systems to the field System perform
Posted 7 months ago
Email this Job to Yourself or a Friend
Indicates required fields