Production Chain. Review, monitor, and store documentation supporting the Command Signals – Military-to-Military (SM2M) Program... Manager. Coordinate with internal and external agencies to track and monitor command partnerships and SM2M relationships...
Clearance Required: TS/SCI CI Poly 9+yrs of experience writing technical documentation for IT, cyber, or data programs... expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team...
characteristics of high-quality training data required to support future AI-powered cyber models. This role focuses on feature... interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented...
Support secure integration with autonomous cyber tools Prepare infrastructure for follow-on IOC execution Qualifications... interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented...
required to enable future AI-powered cyber tools. Working closely with the Data Scientist and technical leads, the ISD converts complex..., quick-reference guides) Translate the program’s data strategy into teachable standards (taxonomy, labeling, metadata...
the end-to-end technical architecture for an autonomous pentesting and data collection capability supporting rapid cyber... secure, scalable architectures for autonomous cyber assessment platforms Define integration, access control, and deployment...
Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber... Quality Control Inspector 1 is responsible for following the M.C. Dean Quality Control (QC) Program to achieve and verify...
, and oversight 3+ years of experience providing cybersecurity leadership as an Information System Security Manager (ISSM...) and interfacing with internal and external SMEs, such as PMs, Cyber Assessors, and AOs Experience with control implementations...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
will act as an ISSO for a large software development program which includes software maintenance and development, IT support... support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system...
selected candidate will act as an ISSO for a large software development program which includes software maintenance... for information systems. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate...
for training Contributes substantive content to the development and maintenance of Training Curriculum's, Schedules, Joint Cyber... tasks in execution of Commander's Cyber Mission training priorities #COSS Qualifications Required: LU Minimum...
of cyber Subject Matter Experts (SMEs) who are providing support to a large, complex technical program for preventing..., identifying, containing and eradicating cyber threats to networks through monitoring, intrusion detection and protective security...
Government Program Manager. Candidate should have some experience with the following intelligence analysis systems / programs... Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and Cyber analytical...
of cyber Subject Matter Experts (SMEs) who are providing support to a large, complex technical program for preventing..., identifying, containing and eradicating cyber threats to networks through monitoring, intrusion detection and protective security...
technical program for preventing, identifying, containing and eradicating cyber threats to networks through monitoring... on a large, complex program that provides system engineering, development, test, integration and operational support. The...
and support your own personalized training program to continue your individual growth. We will provide you with work that matters... Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using...
, complex technical program for preventing, identifying, containing and eradicating cyber threats to networks through monitoring... Security Sector's (NSS) Cyber & Analytics Business Area (CABA). Our talented team is at the forefront in Security Engineering...