and artifacts. The architect will accomplish this by collaborating with stakeholders, including the cyber security and privacy, CPIC... agency offices including the Office of Management and Budget (OMB) Experience with NIST-53 Cyber Security Standards, Open...
and artifacts. The architect will accomplish this by collaborating with stakeholders, including the cyber security and privacy, CPIC... agency offices including the Office of Management and Budget (OMB) Experience with NIST-53 Cyber Security Standards, Open...
information technology solutions from Systems Engineering to Cyber Security, and from Software Development to Product Solutions... expertise, program management and business process knowledge as a trusted advisor in support of our Department of Defense...
program servicing a wide variety of data and voice communications equipment for our prestigious client at the highest levels... options for training, certification, and career advancement. When we succeed, you succeed and together...
assessments while enhancing their current process workflows and developing new processes Provide cyber security expertise... to information security, information assurance, and cloud cyber security. Making recommendations to leadership and developing...
Implementation Guides (STIG), Security Requirements Guides (SRG). · Work with the NAVSEA, PEO IWS, combat system program offices... environment with competing priorities. · Technical IT and cyber security background. · Excellent written skills since the...
Implementation Guides (STIG), Security Requirements Guides (SRG). · Work with the NAVSEA, PEO IWS, combat system program offices... environment with competing priorities. · Technical IT and cyber security background. · Excellent written skills since the...
planning the ERM program design, developing the ERM program and implementing ERM program strategies. Our enterprise risk... management program, including the establishment of foundational processes, governing bodies, and operating models Support the...
the Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem..., Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem to protect... Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Nation’s strategic and unified work to strengthen the security, resilience, and workforces of the cyber ecosystem to protect..., Process Improvement, Change Management, Program and Project Management, Acquisition/Procurement, and Information Technology...
Job Family: IT Cyber Security Travel Required: None Clearance Required: Active Top Secret (TS... to client system owners and system security officers during all phases of the RMF process. Responsibilities include the...
Excepted Promotion potential None Job family (Series) Supervisory status No Security clearance Drug test Yes... Officers are key to the success of many foreign intelligence, counterintelligence, cyber, and covert action operations...
to foreign intelligence vital to U.S. foreign policy and national security decision-makers. Overview Accepting applications... Excepted Promotion potential None Job family (Series) Supervisory status No Security clearance Drug test Yes...
Job family (Series) Supervisory status No Security clearance Drug test Yes Position sensitivity and risk Trust... and national security decision-makers with timely, accurate, clear, and concise reporting in a manner that safeguards sensitive...
Job family (Series) Supervisory status No Security clearance Drug test Yes Position sensitivity and risk Trust... and find opportunities to disrupt terrorist attacks, illegal arms trade, drug networks, cyber threats, and counterintelligence threats...
: A high school degree, or a GED, and more than ten (10) years of relevant experience in cyber security, information system... of relevant experience in cyber security, information system management, software development, design or authorization...
and Authorize community. Develop SOPs for the Assess and Authorize process within CDAO cyber assurance. Develop training program... you will be responsible for developing and executing communication strategies and training content to support cyber policy, practices...
as possible. You bring professionalism and initiative to a fast-paced environment that offers extensive options for training, certification... for training, certification, and career advancement. When we succeed, you succeed and together...