1 to 15 of 49
Sort by: Date | Relevance
The CYBER Intelligence /Signature Management (SM) Subject Matter Expert (SME) supports all aspects of Cyber/SM activities involving the planning and execution of sensitive operations, assisting in the coordination of multiple projects. Drafts and maintains SM and CYBER policy; reviewing SM Program documents, reviewing Standard Operating Procedures (SOP) and other required
Posted Today
Job Number R0197973 IT Helpdesk Specialist and Knowledge Manager Key Role Provide in depth support and lead problem solving and implementation efforts for specific technology products or applications. Apply specific functional knowledge, including working and general industry knowledge. Develop or contribute to solutions to a variety of problems of moderate scope and comp
Posted Today
Conduct incident analysis and recommend mitigation measures in response to general or specific advanced persistent threats (APT) attempted exploits/attacks, malware delivery, etc., On army networks. Mitigations may include blocking/denying access to hostile websites or restricting access to specific ports/protocols and/or applications. Make recommendations to the supporte
Posted Today
Consolidate different data sources into a single view used to assess the status of a specific threat on the network. Develop and/or maintain dashboards displaying specific DCO items of interest (i.e., top 10 attackers, top 10 destinations, top attack vector, etc.) and all active cyber incidents, in near real time to the Theater Operations COP (Common Operating Picture) di
Posted Today
JOB PURPOSE/SUMMARY Responsible for effective provisioning, installation/configuration, operation, and maintenance of systems hardware and software and related infrastructure. ESSENTIAL FUNCTIONS Manages the day to day operations of host computers and enterprise servers by monitoring system performance, configuration, maintenance and repair. Maintains records of system dow
Posted 1 day ago
Conduct incident analysis and recommend mitigation measures in response to general or specific advanced persistent threats (APT) attempted exploits/attacks, malware delivery, etc., On army networks. Mitigations may include blocking/denying access to hostile websites or restricting access to specific ports/protocols and/or applications. Make recommendations to the supporte
Posted 1 day ago
Consolidate different data sources into a single view used to assess the status of a specific threat on the network. Develop and/or maintain dashboards displaying specific DCO items of interest (i.e., top 10 attackers, top 10 destinations, top attack vector, etc.) and all active cyber incidents, in near real time to the Theater Operations COP (Common Operating Picture) di
Posted 1 day ago
As a Customer Support/Technical Support specialist on the IT Customer Support Team, you will provide the organization with information technology support to optimize operational efficiency. Your duties will include resolving technical issues, maintaining hardware and software installations, and improving IT systems. You will provide technical support in Tier 1, Tier 2, an
Posted 1 day ago
https //careers.business.toshiba.com/ Join Our Talent Community Glassdoor Reviews Our Commitment to Sustainability News Archive Solutions & Services Professional Services Print Management Cloud Solutions Our Products eBRIDGE Global Print 2023 Stevie Award Winner Toshiba Office Collection Virtual Demonstration (YouTube) Client Testimonials (YouTube Playlist) Toshiba Americ
Posted 2 days ago
Company Overview At Hexagon US Federal we provide cutting edge technologies and a wide range of professional services to enable our customers to make smarter and faster operational decisions and improve mission effectiveness. Hexagon US Federal is an independent subsidiary of Hexagon Corporation exclusively focused on bringing the broad range of Hexagon technologies to th
Posted 2 days ago
Our adversaries and cyber criminals continue to push limits in cyberspace, creating more national security threats than we have ever seen. In order to ensure the United States maintains its strategic edge in cyberspace, NSA is looking for Computer Network Defense Analysts who are highly skilled, want to stay on the leading edge of technology and are impassioned about ensu
Posted 2 days ago
Are you a cyber professional with the drive and expertise to be on the forefront of the cyber fight; tackling NSA's complex mission to defend against cyber threats of today and tomorrow? NSA, the nation's leading cyber agency, has exciting and challenging positions in Cyber Security Engineering and Cyber and TEMPEST vulnerability analysis/mitigation. Are you ready to help
Posted 2 days ago
The United States has experienced profound changes that impact the way the National Security Agency (NSA) conducts its mission. The explosion of Internet communications has created a need for the Computer Network Operations (CNO) mission. This very important mission includes computer network defense and computer network exploitation. In order to carry out these functions
Posted 2 days ago
Internal Revenue Service
- Anchorage, AK / Homewood, AL / Huntsville, AL / 234 more...
Duties WHAT IS THE CRIMINAL INVESTIGATION (CI) DIVISION? A description of the business units can be found at Vacancies will be filled in the following specialty areas CI Tech Operations and Investment Services The following are the duties of this position at the full working level. The work of this position requires ensuring the integration of IT programs and services; de
Posted 2 days ago
The Network Technician will provide network engineering and administration operations on Layer 2 (L2) and Layer 3 (L3) of switches and router devices to maintain a secure and operational network environment in compliance with Government policies and regulations. Must provide support for the design, engineering, installation, operation, maintenance and configuration of all
Posted 3 days ago
Email this Job to Yourself or a Friend
Indicates required fields