1 to 15 of 291
Sort by: Date | Relevance
The CYBER Intelligence /Signature Management (SM) Subject Matter Expert (SME) supports all aspects of Cyber/SM activities involving the planning and execution of sensitive operations, assisting in the coordination of multiple projects. Drafts and maintains SM and CYBER policy; reviewing SM Program documents, reviewing Standard Operating Procedures (SOP) and other required
Posted Today
Lead and manage YOUR team at solar+battery facilities at Lawai & Kekaha sites and other sites currently under construction. Build and create a motivated TEAM of technicians to safely and proactively troubleshoot and repair all equipment at the facility. Equipment to learn and maintain includes PV solar modules, PV arrays, inverters, and battery energy storage system (BESS
Posted Today
Job Number R0197973 IT Helpdesk Specialist and Knowledge Manager Key Role Provide in depth support and lead problem solving and implementation efforts for specific technology products or applications. Apply specific functional knowledge, including working and general industry knowledge. Develop or contribute to solutions to a variety of problems of moderate scope and comp
Posted Today
Maintain and update SIEM tool software rules for optimal detection of malicious or unauthorized activity. Consolidate different data sources into a single view used to assess the status of a specific threat on the network. Develop and/or maintain dashboards displaying specific DCO items of interest (i.e., top 10 attackers, top 10 destinations, top attack vector, etc.) And
Posted Today
Shall operate, monitor, sustain, and secure the SIEM using the full capabilities of the application (e.g., logging all security events and performing event analysis). The SIEM aggregates data from daily from multiple Army Garrison and tactical network sources, which includes, but is not limited to, Intrusion Protection System, Intrusion Detection Systems, Firewalls, Proxi
Posted Today
Provide cyber threat awareness reports on network threats/trends to the theater. Produce informational reports for theater stakeholders to address evolving cyber threats/trends to increase situational awareness and affect positive changes to the defensive posture of the networks. To maximize awareness of potential impacts to commanders and other stakeholders, reports shal
Posted Today
Operate, manage, and defend the classified and unclassified active directory forest. Ensure the AP forest is secure and operational 99.9 percent of the time. Provide AD service support for DODIN A PACIFIC. Provide AD situational awareness to RCC P Director, Deputy Director, and Team Lead. Diagnose/repair AD Degradation or interruptions. Provide Army Pacific portion of the
Posted Today
Shall secure, maintain, update, harden and document all VI internal and Enterprise managed systems within the customer area of responsibility (AOR). Shall include enclave administration, fault management, trouble analysis, incident handling and reporting, system status reporting, implementation testing and acceptance, and general administrative tasks. Provide system perfo
Posted Today
Conduct incident analysis and recommend mitigation measures in response to general or specific advanced persistent threats (APT) attempted exploits/attacks, malware delivery, etc., On army networks. Mitigations may include blocking/denying access to hostile websites or restricting access to specific ports/protocols and/or applications. Make recommendations to the supporte
Posted Today
Provide enterprise class relational database management system administration and analysis support for disparate database systems and architecture. Install, maintain, deploy, manage, and harden DMBS; troubleshoot and remediate issues; and recommend updates/solutions to improve the quality of the service for the enterprise. Analyze and plan for anticipated changes in data
Posted Today
Consolidate different data sources into a single view used to assess the status of a specific threat on the network. Develop and/or maintain dashboards displaying specific DCO items of interest (i.e., top 10 attackers, top 10 destinations, top attack vector, etc.) and all active cyber incidents, in near real time to the Theater Operations COP (Common Operating Picture) di
Posted Today
Develop and distribute content provided by security platform vendors at least weekly and as needed. Develop and distribute in house content based on tippers from higher organizations and the threat hunt team. Analyze, correlate, and trend anomalous cyber events and incidents analyze and correlate anomalous events identified in, SIEM systems, big data analytics, and suppor
Posted Today
Job Number R0196464 Business Analyst, Mid The Opportunity You know that true progress is made at the intersection of business and tech, and as an IT Business Analyst, you can develop your skills in both. Here, you'll have the chance to work with an Agile team as they develop digital products to support your clients' most pressing missions. We're looking for someone like y
Posted Today
Job Number R0196360 Data Engineer The Opportunity Ever expanding te chn ology like IoT, machine learning, and artifi cia l intelligence means that there's more structured and unstructured data available today than ever before. As a data engineer, you know that organizing big data can yield pivotal insights when it's gathered from disparate sources. We need a data professi
Posted Today
Job Number R0193459 Data Scientist and Visualization Specialist The Opportunity As a data scientist, you're excited at the prospect of unlocking the secrets held by a data set, and you're fascinated by the possibilities presented by IoT, machine learning, and artifi cia l intelligence. In an increasingly connected world, massive amounts of structured and unstructured data
Posted Today
Email this Job to Yourself or a Friend
Indicates required fields