Full-time - Full Time Service Excepted Promotion potential 14 Job family (Series) Supervisory status No Security...
is properly tested through each environment. Collaborate with QA, Performance Test, and Security to help facilitate all work...: Collaborate with Business partners, Security, and vendors (as necessary) to plan and implement shared capabilities that support...
, ‘Building Trust, Accountability, Effective Communication, Customer Focus, and Proactive Safety & Security’ are what every... will not be permitted to perform safety-sensitive functions. In accordance with federal law governing security checks of covered...
), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: -Leverage their extensive IC policy... related to IC policy to continuously refine security inspection protocols. Participate in inspection planning, execution...
Community Directives (ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs...), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct comprehensive technical assessments...
Community Directives (ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs...), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct manual audits and vulnerability...
role in assessing the security posture of cloud environments across the Intelligence Community (IC). They conduct thorough... technical assessments and analyze cloud configurations, access controls, and security baselines to ensure compliance...
Community Directives (ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs...), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Leverage extensive technical expertise...
Community Directives (ICDs), IC Technical Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs...), Security Requirement Guides (SRGs), and NIST 800-53 rev 5 security controls. OTHER: Conduct thorough technical assessments...
Directives (ICDs), Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53 Rev 5..., patch management, and security logging. Analyze vulnerabilities related to UNIX systems and recommend mitigation strategies...
Implementation Guides (TIGs), Security Technical Implementation Guides (STIGs), Security Requirement Guides (SRGs), and NIST 800-53... rev 5 security controls. DUTIES: Leverage extensive expertise in vulnerability management tools, processes, and lifecycle...
an active Top Secret security clearance. Must be a U.S. Citizen. Physical Requirements: The ideal candidate must at a minimum...
, business development, or operational security review. At least six (6) years' experience in specialized and focused company...
, at least 3 years' experience. Assigned to Military Protective Security Operations Units; specifically, Air Force OSI, Army CID... locations prior to a protectee's arrival. Center point for disseminating information regarding security-related incidents...
, at least 3 years' experience. Assigned to Military Protective Security Operations Units; specifically, Air Force OSI, Army CID... locations prior to a protectee's arrival. Center point for disseminating information regarding security-related incidents...
, dental and vision coverage, Flexible Spending Accounts (FSAs), disability coverage, security, retirement and saving benefits...
, Artificial Intelligence/Machine Learning, Cyber Security and Cutting-Edge Technology across the US Government. Be a part... methods, and security procedures for specific user applications and ensures proper accesses are maintained. Required Skills...
, Artificial Intelligence/Machine Learning, Cyber Security and Cutting Edge Technology across the US Government. Be a part...
enforcement, security, or operational mission procurements. Experience mentoring or leading junior acquisition staff. PMP...
network troubleshooting Understanding of Internet security and data privacy principles About Highlight: For over ten years...