It is the policy of AT&T to provide equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, sexual orientation, gender identity and/or expression, genetic information, marital ...
Mid - Senior Intelligence Analyst with depth of experience in processing electronic signals (Strategic C4I systems). Produce local training materials, working aids, and tailored database accesses to support both knowledge transfer to other analysts and day to day work. Produce local training materia...
Information Security Analyst - Intermediate. Information Security Analyst - Intermediate. Summary: Chenega Agile Real-Time Solutions (CARS) is looking forInformation Security Analyst – Intermediateto join our team in the Patuxent River area. Plan, implement, upgrade, or monitor security measures for...
QinetiQ US’s dedicated experts in defense, aerospace, security, and related fields all work together to explore new ways of protecting the American Warfighter, Security Forces, and Allies. Being a part of QinetiQ US means being central to the safety and security of the world around us. We are lookin...
At BlueHalo our analysts provide actionable intelligence. BlueHalo is in search of Exploitation Analysts (all levels) to join our team. As an Exploitation Analyst with our Intel division, you will be working closely with other technical experts where you will play a crucial role in skillfully using ...
Our national security depends on technology as never before, and this dependence is growing at an ever-increasing rate. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetration testing, computer forensics, info...
This role is the first point of contact for department end users on application security, application security policies, change modification analysis, functional issue resolution, and related functional and security user and application requirements. Recommend information security policies and lead ...
Ensures the accuracy of student support and student information data through monitoring data collection and corrections and through the analysis, validation, and reporting of data. Prepares and reviews various reports to ensure the timely and accurate entry of data, data corrections and validations,...
This will include analyzing large-scale datasets using advanced bioinformatic tools, developing and implementing novel computational approaches for data analysis, interpreting and presenting complex biological data to drive discovery, as well as mentoring and advising on statistical and computationa...
As a Linux System Administrator for real-time systems, you will. Are you eager to apply your system administration skills in a development environment where we evolve Navy systems of tomorrow?. As a member of our team, you'll develop a deep understanding of Linux administration and the Risk Manageme...
Configures and manages UNIX, Linux and Windows operating systems and installs/loads operating system software, troubleshoots, maintains integrity and configures network components along with implementing operating systems enhancements to improve reliability and performance. Provides support for impl...
Reporting to the Associate Director for Program Data Systems, the Business Analyst for Program Data Systems will be responsible for essential management activities related to the Children's Services data processes, including the case management system (Apricot) by analyzing data processes and improv...
Research Program Manager must be capable of leveraging project management techniques to effectively manage and track small to large-scale projects across multi-disciplinary teams and international collaborations. Research Program Manager may participate in site visits in India and will collaborate w...
Research Program Manager, CDHAI. Classified Title: Research Program Manager. Job Posting Title (Working Title): Research Program Manager, CDHAI. The center's extensive program portfolio includes research and education projects across a broad range of digital health technologies and AI which require ...
Key Responsibilities:Architect security solutions for business applications based on security principlesImplement NIST-compliant continuous monitoring process across major information systemsSupport security assessment, information assurance, and vulnerability testingRequired Qualifications:Bachelor...
A company is looking for an Information Security Analyst (Vulnerability Management Specialist). Key Responsibilities:Perform risk and vulnerability assessmentsAnalyze vulnerabilities and determine mitigation strategiesMaintain cyber defense assessment toolkit and prepare reports on findingsRequired ...
A company is looking for a Business Analyst. ...
A company is looking for a Business Systems Analyst VII. ...
A company is looking for a Business Systems Analyst in Healthcare. ...
A company is looking for a Technical Program Manager II. ...
A company is looking for a Business Operations Research Analyst. Key Responsibilities:Research and analyze solutions to extend the company's cloud-based data warehouseDesign and build relational and dimensional data models using ER modeling techniquesBuild statistical algorithms and data models to i...
A company is looking for a Data Analyst Manager. ...
A company is looking for a Customer Onboarding Project Manager. Key Responsibilities:Collaborate with customers on project plans for successful adoption of Resident Benefits PackageGuide customers through onboarding process, troubleshoot concerns, and course correct as neededWork with Sales and Clie...
A company is looking for an IT Helpdesk Trainee. ...
A company is looking for an Implementation Project Manager II. ...