Production Chain. Review, monitor, and store documentation supporting the Command Signals – Military-to-Military (SM2M) Program... Manager. Coordinate with internal and external agencies to track and monitor command partnerships and SM2M relationships...
Must Be Able to Obtain: Top Secret SCI + Polygraph Public Trust/Other Required: None Job Family: Cyber and IT Risk Management... support for a program, organization, system, or enclave’s information assurance program. Provides support for proposing...
Support secure integration with autonomous cyber tools Prepare infrastructure for follow-on IOC execution Qualifications... interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented...
required to enable future AI-powered cyber tools. Working closely with the Data Scientist and technical leads, the ISD converts complex..., quick-reference guides) Translate the program’s data strategy into teachable standards (taxonomy, labeling, metadata...
characteristics of high-quality training data required to support future AI-powered cyber models. This role focuses on feature... interview conducted via video with the hiring manager and/or team Camera must be on A valid photo ID must be presented...
Clearance Required: TS/SCI CI Poly 9+yrs of experience writing technical documentation for IT, cyber, or data programs... expect: During the Interview Process Virtual video interview conducted via video with the hiring manager and/or team...
the end-to-end technical architecture for an autonomous pentesting and data collection capability supporting rapid cyber... secure, scalable architectures for autonomous cyber assessment platforms Define integration, access control, and deployment...
Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber... Quality Control Inspector 1 is responsible for following the M.C. Dean Quality Control (QC) Program to achieve and verify...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
, and oversight 3+ years of experience providing cybersecurity leadership as an Information System Security Manager (ISSM...) and interfacing with internal and external SMEs, such as PMs, Cyber Assessors, and AOs Experience with control implementations...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
technician serves as an expert technical resource reporting to a program manager, interacting with Onsite Engineering Operations...Overview: About M.C. Dean M.C. Dean is Building Intelligence. We design, build, operate, and maintain cyber...
will act as an ISSO for a large software development program which includes software maintenance and development, IT support... support to the Information System Security Manager (ISSM) for maintaining the appropriate operational IA posture for a system...
selected candidate will act as an ISSO for a large software development program which includes software maintenance... for information systems. Provide support to the Information System Security Manager (ISSM) for maintaining the appropriate...
for training Contributes substantive content to the development and maintenance of Training Curriculum's, Schedules, Joint Cyber... tasks in execution of Commander's Cyber Mission training priorities #COSS Qualifications Required: LU Minimum...
Government Program Manager. Candidate should have some experience with the following intelligence analysis systems / programs... Command, Control, Communications, Computers, Intelligence, Surveillance, and Reconnaissance (C4ISR) and Cyber analytical...
of cyber Subject Matter Experts (SMEs) who are providing support to a large, complex technical program for preventing..., identifying, containing and eradicating cyber threats to networks through monitoring, intrusion detection and protective security...
of cyber Subject Matter Experts (SMEs) who are providing support to a large, complex technical program for preventing..., identifying, containing and eradicating cyber threats to networks through monitoring, intrusion detection and protective security...
and support your own personalized training program to continue your individual growth. We will provide you with work that matters... Engineering in Enterprise and Cyber Security solution spaces. We excel at delivering stable and reliable software solutions using...
technical program for preventing, identifying, containing and eradicating cyber threats to networks through monitoring... on a large, complex program that provides system engineering, development, test, integration and operational support. The...