1 to 15 of 2,760
Sort by: Date | Relevance
Prepare and document functional designs and solutions for Work Asset Management in Oracle WAM 2.3/2.4 based on functional requirements, specifications, business process models and other functional input. Participate in design and validating/reviewing technical solutions. Guide the development team to utilize the appropriate plugin algorithms. Configure Oracle WAM 2.3/2.4
Posted 1 day ago
The Cybersecurity Analyst will work with our government client to provide operational and policy support for ensuring the security of critical information systems . You will do the following Maintain a System Security Dashboard Monitor COTS products and Open Source products used in the OMB environment for new security vulnerabilities or patches and notify the relevant sta
Posted Today
Assists with design, configuration, and implementation of the MedStar Health security architecture. Defines security requirements as the security liaison for technical and application systems implementations. Assists with the development, implementation and administration of enterprise information security policies and procedures. Assists in the review and update of corpo
Posted Today
Lead the development of innovative solutions in support of priority capture efforts, balancing these solutions against cost, schedule, function, quality, and other business considerations. Create content for white papers, proposals, and briefings demonstrating the thought leadership capabilities of the organization, as well as supporting various marketing and business dev
Posted Today
Lead the development of innovative solutions in support of priority capture efforts, balancing these solutions against cost, schedule, function, quality, and other business considerations. Create content for white papers, proposals, and briefings demonstrating the thought leadership capabilities of the organization, as well as supporting various marketing and business dev
Posted Today
Respond to data acquisition requests from a variety of DHS and non DHS customers, to include Freedom of Information Act (FOIA), Office of Inspector General (OIG), Office of General Counsel (OGC), law enforcement entities, etc. Stay up to date on new federal, state, and local laws and regulations regarding the collecting and dissemination of data to requestors Work with re
Posted Today
Identify and remediate misconfigurations, conflicting rules, security gaps, firewall and load balancer security issues, optimize rule sets, and enhance the overall security posture and performance of Firewalls and Load Balancers Provide Tier 3 support to members of the operations network administrations. Maintain all HW and SW components at vendor supported levels. Suppor
Posted Today
Lead and facilitate all customer cross domain technology projects in accordance with customer requirements, governing compliance within project schedule, scope and mission need. Manage requirements managing of CDS's solutions and customer sets Facilitate and ensure quality and process for full life cycle development and operations Work as primary customer interface for te
Posted Today
The Cyber Security Solution Architect is responsible for researching, evaluating, planning, designing, engineering, and delivering cybersecurity solutions. This includes Support overall division technical innovation, differentiation, and strategy to include creation and execution of a technology roadmap, development of technical strategies for division captures, and suppo
Posted Today
The DES program supports a highly demanding mission and requires support from top technical and management talent to migrate common IT services for over twenty DoD agencies under a common platform. You will play a key role in performing the discovery, design, and migration tasks in support of building a world class Single Service Provider for the Department of Defense. Th
Posted Today
Motivated self starter with strong written and verbal communication skills, and the ability to create com plex technical reports on analytic ndings Review DoD intelligence for threats Complete basic level cyber analysis of potential events Performs vulnerability, risk and threat analysis Additionally, this position may require rotating shift work Performs other duties as
Posted Today
Motivated self starter with strong written and verbal communication skills, and the ability to create com plex technical reports on analytic ndings Review DoD intelligence for threats Complete basic level cyber analysis of potential events Performs vulnerability, risk and threat analysis Additionally, this position may require rotating shift work Performs other duties as
Posted Today
Plan and evaluate processes and procedures to support the following tasks Assist with development of cyber compliance documentation. Research, create and test rules within various system tools. Perform monitoring and analysis of security events of interest. Support escalation to and work closely with Sr. analysts and engineers as required. Assist with the identification,
Posted Today
Provide aid to the program, organization, system, or enclave's information assurance program. Lend assistance for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Maintain operational security posture for an information system or program to ensure information systems security policies, standards, and
Posted Today
Looking for an opportunity to make an impact? At Leidos, we deliver innovative solutions through the efforts of our diverse and talented people who are dedicated to our customer's success. We empower our teams, contribute to our communities, and operate sustainably. Everything we do is built on a commitment to do the right thing for our customers, our people, and our comm
Posted Today
Email this Job to Yourself or a Friend
Indicates required fields