Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
Job Description:
Parsons is looking for an amazingly talented Security Technician to join our team! In this role you will provide security services to the site.
Please note that this requisition is for ongoing and future needs. Responses may be delayed as these roles become available due to growth in the coming months. For candidates not local to Faro, these position work on a fly-in/fly-out rotational basis.
What You'll Be Doing:
What Required Skills You'll Bring:
Minimum Clearance Required to Start:
Not Applicable/NoneThis position is part of our Critical Infrastructure team.For more than 75 years, our experts have designed and delivered the critical infrastructure that connects and protects communities around the world. We work in diverse, collaborative teams, both within the company and with our partners and customers, to plan, design, build, and modernize infrastructure. We take special pride in projects and solutions that improve communities as well as people’s quality of life by promoting economic growth, enhancing mobility, and increasing sustainability and resiliency. Powered by our people, we provide the imagination necessary to support our customers’ visions—and to help them see new possibilities.We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as health, vision, dental, employer paid provincial care premiums, life insurance, paid time off, sick leave, all province observed holidays off, and gym membership discounts to fit your busy lifestyle!The position may require a COVID vaccination or an approved accommodation/exemption for a disability/medical condition or religious belief as required by customer requirements and some cases federal, state, provincial or local mandates.
Parsons is an equal opportunity employer committed to diversity, equity, inclusion, and accessibility in the workplace. Diversity is ingrained in who we are, how we do business, and is one of our company’s core values. Parsons equally employs representation at all job levels for minority, female, disabled, protected veteran and LGBTQ+.We truly invest and care about our employee’s wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest—APPLY TODAY!Official account of Jobstore.
As a global leader in smart, healthy and sustainable buildings, our mission is to reimagine the performance of buildings to serve people, places and the planet. Join our winning team and pave the way for a bright future. With our extensive reach across various industries worldwide, our teams are uniquely positioned to support and empower you. You will have the opportunity to develop yourself through meaningful work projects and learning opportunities. We strive to provide our employees with an experience, focused on supporting their physical, financial, and emotional wellbeing.
Join the Johnson Controls family and thrive in a culture that values your voice and ideas.
Your next incredible opportunity is just a few clicks away!
Here's what we have to offer
What you will do
As a Johnson Controls Security Service Technician, you will alleviate concerns the customer may have regarding a security system. You will advise customers and the customer care center of the status of systems and processes inspections. You will inspect fire systems, burglar alarm systems, CCTV, and access.
How you will do it
What we look for
Required
Preferred
JCI employees are valued members of the Johnson Controls family. They are dedicated, skilled, and passionate individuals who contribute to the success and growth of our company. We prioritize creating a positive and inclusive work environment that fosters collaboration, innovation, and personal development. Our employees are encouraged to voice their ideas and opinions, knowing that they will be heard and valued. We believe in investing in our employees' well-being, providing competitive salaries, comprehensive benefits packages, and opportunities for career advancement. With a strong emphasis on safety and a commitment to sustainability, JCI employees play a crucial role in shaping a smarter, healthier, and more sustainable future for buildings and communities worldwide.
#LI-Onsite
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
Official account of Jobstore.
Sponsorship Available:
The University of Arkansas for Medical Sciences (UAMS) has a unique combination of education, research, and clinical programs that encourages and supports teamwork and diversity. We champion being a collaborative health care organization, focused on improving patient care and the lives of Arkansans.
UAMS offers amazing benefits and perks (available for benefits eligible positions only):
Below you will find the details for the position including any supplementary documentation and questions you should review before applying for the opening. To apply for the position, please click the Apply link/button.
The University of Arkansas is an equal opportunity, affirmative action institution. The University does not discriminate in its education programs or activities (including in admission and employment) on the basis of age, race, color, national origin, disability, religion, marital or parental status, protected veteran status, military service, genetic information, or sex (including pregnancy, sexual orientation, and gender identity). Federal law prohibits the University from discriminating on these bases. Questions or concerns about the application of Title IX, which prohibits discrimination on the basis of sex, may be sent to the University's Title IX Coordinator and to the U.S. Department of Education Office for Civil Rights.
Persons must have proof of legal authority to work in the United States on the first day of employment.
All application information is subject to public disclosure under the Arkansas Freedom of Information Act.
At UAMS we value Diversity, Equity and Inclusion.
For general application assistance or if you have questions about a job posting, please contact Human Resources at askrecruitment@uams.edu.
Department's Website:
Minimum Qualifications:
Preferred Qualifications:
Additional Information:
Salary Information:
Required Documents to Apply:
Optional Documents:
Recruitment Contact Information:
Please contact askrecruitment@uams.edu for any recruiting related questions.
All application materials must be uploaded to the University of Arkansas System Career Site https://uasys.wd5.myworkdayjobs.com/UASYS
Please do not send to listed recruitment contact.
This position is subject to pre-employment screening (criminal background, drug testing, and/or education verification). A criminal conviction or arrest pending adjudication alone shall not disqualify an applicant except as provided by law. Any criminal history will be evaluated in relationship to job responsibilities and business necessity. The information obtained in these reports will be used in a confidential, non-discriminatory manner consistent with state and federal law.
Official account of Jobstore.
Official account of Jobstore.
Be part of the future!
We are one team, dedicated to working collaboratively to create the purposeful solutions that propel the world forward. We hope you will join our diverse team of top people – you bring your talent, and we’ll give you the space and opportunities to grow and succeed. We are committed to make a difference.
What we offer:
Competitive Starting Pay
Paid Training
Tuition reimbursement
Global Advancement Opportunities
Company Vehicle (as applicable)
Referral Bonuses
Comprehensive Benefits
Medical/Dental/Vision insurance
Health Savings Account (HSA)
Life Insurance
401(k) savings plan with company match
Short-Term and Long-Term Disability
Employee Assistance Program
Wellness Program
And More!
What you will do
Service Technicians diagnose problems and perform service and repairs on card access, CCTV, burglar alarm systems, electronic fire alarm systems and other related building system products at customer sites.
How you will do it
Follow prescribed troubleshooting procedures and refer to technical manuals, part manuals, change notices and bulletins, modification notices, etc. to repair equipment.
Service, troubleshoot, and install card access, CCTV, and burglar alarm systems.
Read and interpret blueprints, diagrams, submittals, specifications software/systems, programs, schematics, and operational product manuals.
Exhibit effective customer service skills by consistently communicating with staff and customers to ensure customer satisfaction.
Complete Service Acknowledgements with proper coding through communication devices such as smart phones and laptop computers.
Obtain customer signature upon completed service call assignment.
Available for on-call emergency service.
Perform other duties as assigned.
What we look for
Required
2-year degree or equivalent combination of education and experience.
4 years documented experience with card access and CCTV.
Knowledge of test equipment, multi-meter, digital analyzer, and commissioning devices.
Experience installing, inspecting, repairing, and programming card access and CCTV.
Fire alarm experience is a plus.
Experience in reading and interpreting blueprints, submittals, and operational/product manuals.
Ability to follow verbal and written instructions.
Capable of performing physical labor to include carrying and moving equipment and tools up to 50-70 lbs.
Able to work in unusual and sometimes difficult position such as climbing ladders, scaffolding and high lift equipment up to 40 feet, working within ducts, crawl spaces, above ceilings, etc.
Ability to work flexible hours including weekends to meet customer requirements.
Overnight travel may be required.
Demonstrate a high level of customer service.
Maintain truck inventory to ensure timely response to customer needs.
Ability to adhere to, implement, and always follow safety guidelines and procedures.
Strong organizational skills, positive attitude, and an ability to learn quickly.
Possess a valid driver’s license and driving record that meets company requirements.
Able to pass a pre-employment background and drug test.
Retain any licenses that are required by National, State and Local codes.
Knowledge of applicable NFPA standards.
Preferred:
NICET III preferred in the subfield of Special Hazard Systems or Level III in subfield of Fire Alarm.
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer, and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, status as a qualified individual with a disability, or any other characteristic protected by law. For more information, please view EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit www.johnsoncontrols.com/careers.
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
Official account of Jobstore.
Be part of the future!
We are one team, dedicated to working collaboratively to create purposeful solutions that propel the world forward. We hope you will join our diverse team of top people – you bring your talent, and we’ll give you the space and opportunities to grow and succeed. We are committed to make a difference.
What we offer:
What you will do
This position will be responsible for the installation of complex integrated security systems to include the wiring, equipment and programming of access control systems, CCTV, digital recorders, network recorders, and intercom systems for clients.
How you will do it
What we look for
Required
Johnson Controls International plc. is an equal employment opportunity and affirmative action employer and all qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin, age, protected veteran status, genetic information, sexual orientation, gender identity, status as a qualified individual with a disability or any other characteristic protected by law. To view more information about your equal opportunity and non-discrimination rights as a candidate, visit EEO is the Law. If you are an individual with a disability and you require an accommodation during the application process, please visit here.
Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Campbell, KY The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Aberdeen Proving Ground, MD The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$75,200 - 158,100 USDOfficial account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Drum, NY. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Bliss, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Liberty, NC The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Johnson, LA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Riley, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Cavazos, TX. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Stewart, GA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
Careers in legal can be found in the local and private sector to ensure the company runs smoothly by providing administrative support to solicitors and legal executives. Legal jobs comprise of solicitor, lawyers, corporate attorney, compliance officer, risk manager, judges, paralegal, tax adviser, internal auditor, legal assistant and legal counsel.
The role of legal assistant is to ensure the smooth running of the office and effective case management. Responsibilities include providing administrative support to lawyers, handle communication with clients, administratively attend trials, prepare case briefs, conducting documentary research, develop case relevant information, file basic legal documents, answer phone calls, maintain contact lists and monitor deadlines.
The role of corporate lawyer is to ensure a company’s transactions comply with corporate law and regulations. Responsibilities include preparing the appropriate legal documents for court proceedings, evaluate new business partnerships, cooperate with law firms, represent the company in legal proceedings, oversee the company’s policy on legal matters, protecting the company against legal risks, negotiate deals on behalf of the company and guide management on compliance issues.
The role of lawyers is to represent clients in criminal and civil litigation as well as other legal proceedings. Responsibilities include question witnesses during the course of a trial, interpret laws for individuals, summarise cases to judges/juries, prepare legal briefs, analyse the probable outcomes of cases, examine legal data to determine advisability, cooperate with legal firms, help develop federal and state programs.
The role of legal advisor is to provide legal advice, organise various legal activities, create legal documents and advise the clients on all the relevant legal issues. Responsibilities include conduct legal analysis, involved in drafting different legal submissions, assist in reviewing legal material and draw up formalities regarding the settlement of disputes.
The role of compliance officer is to ensure that the operations and business transactions follow all relevant legal rules. Responsibilities include implementing an effective legal compliance program, createsound internal controls, draft company policies, proactively audit processes, evaluate business activities to assess compliance risk, collaborate with external auditors, educate employees on regulations and industry practices.
The role of company secretary is to undertake a variety of administrative and clerical tasks. Responsibilities include effectively communicating with clients, greet visitors, attend trials, write case briefs, conduct thorough documentary research, verify important case intelligence, preserve an updated case record system, answer phone calls, update inventories of contact details and facilitate the meeting of deadlines by providing timely reminders.
The public sector job is managed by government bodies that include family service agencies or non-profit organisations. Some public sector jobs include industrial relations, health and administration.
Security is a major concern to all organisations which makes it an exciting and lucrative career choice. Security jobs include analyst, security manager, auditor, cyber security and safety.
The role of security guard is to protect premises, assets and personnel. Responsibilities include act lawfully in direct defense of property, evict violators, take accurate notes of unusual occurrences, report in detail any suspicious incidents, patrol regularly around the perimeter, monitor access at building entrances and watch alarm systems.