client's IT staff, security personnel, and other stakeholders to understand their specific requirements, address..., automation, and federal security standards will be fundamental in ensuring the successful establishment and operation...
client's IT staff, security personnel, and other stakeholders to understand their specific requirements, address..., automation, and federal security standards will be fundamental in ensuring the successful establishment and operation...
platforms; and continually improving the performance, security, and availability of enterprise IT services. Position is on-site... Manager in overseeing a large-scale IT Enterprise Program (CEEOSS) for the Cybersecurity and Infrastructure Security Agency...
platforms; and continually improving the performance, security, and availability of enterprise IT services. Position is on-site... Manager in overseeing a large-scale IT Enterprise Program (CEEOSS) for the Cybersecurity and Infrastructure Security Agency...
Host Forensic Analyst/Host Based Systems Analyst Location: Arlington, VA Must have Top Secret Security Clearance... - Providing technical assistance on digital evidence matters and forensic investigative techniques to appropriate personnel when...
and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution. Contract personnel.../Splunk Cloud for system monitoring, security analytics, and operational intelligence - Implement and monitor security...
. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist... such as Ansible, Terraform, or Red Hat Satellite Collaborate with security teams to ensure compliance with security standards...
. Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist... operational threat environments, and associated attacks (MITRE ATT&CK framework) Knowledgeable of network security monitoring...
Capital Region. Contract Security Officer (CSO) contract. This role is responsible for developing, maintaining, and enforcing... 2018) experience managing similar contracts of comparable size and complexity (approximately 125-150 Personnel...
. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist... Response Teams [CERTs], SANS, Security Focus) to maintain currency of Computer Network Defense threat condition and determine...
. Contract personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist..., security analytics, and operational intelligence Implement and monitor security controls, including STIG compliance, access...
incident response, and immediate investigation, using host and network-based cybersecurity analysis capabilities. Personnel... anomalous network activity Assess network topology and device configurations identifying critical security concerns...
leadership, and VIP stakeholders. This role ensures optimal performance, security, and usability of Apple endpoints and mobility..., government leadership, directors, and mission-critical personnel. Provide efficient in-person and remote assistance with minimal...
leadership, and VIP stakeholders. This role ensures optimal performance, security, and usability of Apple endpoints and mobility..., government leadership, directors, and mission-critical personnel. Provide efficient in-person and remote assistance with minimal...
analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR... techniques to appropriate personnel when necessary Write in-depth reports, supports with peer reviews and provides quality...
personnel provide front line response for digital forensics/incident response (DFIR) and proactively hunting for malicious cyber... network topology and device configurations identifying critical security concerns and providing security best practice...
. Contract personnel perform investigations to characterize of the severity of breaches, develop mitigation plans, and assist... standard operating procedures (SOPs) and policies Maintain configuration and support documentation Employ security concepts...
cybersecurity analysis capabilities. Contract personnel provide front line response for digital forensics/incident response (DFIR... Active TS/SCI Clearance Ability to obtain Department of Homeland Security (DHS) Entry on Duty (EOD) Suitability BS Computer...
personnel perform investigations to characterize the severity of breaches, develop mitigation plans, and assist with the... (i.e. Defense in Multiple Places, layered defenses, security robustness, etc.) Perform Computer Network Defense incident triage...
personnel and ILS personnel to ensure BOM materials are in hand prior to installations and installation documentation.... Required Experience U.S. Citizenship and eligibility for a U.S. Government granted security clearance. Interim Secret security clearance...