Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Cleared Job Fair Job Seeker Handbook March 7, BWI, MD


Published on

If you've got a polygraph, please pre-register here:

Published in: Recruiting & HR
  • Be the first to comment

  • Be the first to like this

Cleared Job Fair Job Seeker Handbook March 7, BWI, MD

  1. 1. Poly-Only Cleared Job Fair Job Seeker Handbook #ClearedJobFair Thursday, March 7 DoubleTree BWI Linthicum, MD 2pm - 6pm
  2. 2. Welcome to a Cleared Job Fair! LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US: Schedule 11AM - 3PM Resume Reviews These are quick 5 minute sessions where a job seeker can review their resume directly with a recruiting professional. We offer these sessions on a first-come, first- serve basis and they fill up fast. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card. Best Recruiter Your vote counts! Your Job Seeker survey asks which company or companies provided you with the best recruiting experience today. We tally your votes and recognize the top companies as Best Recruiters. BEST RECRUITER
  3. 3. 4 | P a g e Altamira Technologies Altamira Technologies Corporation is a top open source technology company in the national security space. Headquartered in McLean, Virginia, Altamira provides engineering and analytic services to the defense, intelligence, and homeland security communities. Our cleared engineers develop and implement big data solutions for knowledge management and advanced analytics. We are authors and contributors to leading open source tools, including Lumify, an open source big data analysis and visualization platform built by Altamira engineers. Altamira Technologies Corporation was formed in January of 2013, when McLean- based Invertix Corporation and Reston-based Near Infinity Corporation merged. Both legacy companies have a long history of support to the DOD and U.S. Intelligence Community with a wide range of talent in software development, infrastructure, analysis and project management. H I R I N G  Applications Developer  Systems Engineer  SIGINT Cyber Analyst  Embedded Developer
  4. 4. 5 | P a g e Chesapeake IT Consulting Chesapeake IT Consulting is an agile, national security technology small business offering information technology services, infrastructure design and administration services, and cyber security solutions to ensure your business is successful, sustainable, and secure. Offerings include 20 years of experience in:  Identity and authorization management services  Extensive Linux systems customization, hardening, and deployments to the enterprise cloud  Java development for enterprise web applications and middleware services  Enterprise administration, monitoring and load-balancing  Data science, data analytics and cloud based big data technologies H I R I N G  Cloud Analytics Developer  Cloud Hosting Engineer  Cyber Exploit Developer  Jr. Mid and Sr. Java Developer  Linux System Administrator  Linux System Engineer
  5. 5. 6 | P a g e E Cyber7 Technologies H I R I N G  Software Engineering and Analysis  Cyber Engineering and Integration  Security Engineering  Information Systems Security Engineer (ISSE)  Cyber Security Analyst - Expert  Cyber Security Engineer  Cyber Security Specialist  Senior Database Administration Technician  Database Administrator Senior  Engineering Analyst  Network Engineer Junior  Security Analyst  Security Analyst Senior  System Security Engineer  Test Engineer Junior E Cyber7 Technologies, LLC (EC7) is an Information Assurance/Cybersecurity consulting company focused on serving the information technology/cyber security needs of federal, state and local government agencies. A Certified Disabled Veteran-Owned Small Business (SDVOSB) based in the state of Maryland, the company has over 30 years of experience in Department of Defense technologies and processes. EC7 offers valuable Cyber security assessments, risk management, in-depth agile program management processes, information systems security engineering, software development and applications, and threat analysis. Experience in Department of Defense (DOD) and Intelligence Community (IC) processes and procedures. Additionally, EC7 has extensive knowledge in cyber defense, Key Management Infrastructure (KMI), network encryption development and DAWIA certified program managers.
  6. 6. 7 | P a g e Edwards Performance Solutions Customizable & Secure Solutions For more than two decades, our experienced Edwards team has provided business solutions that result in greater operational performance. Providing maximum value to public and private sector clients, we incorporate cyber with every tailored solution – so security isn’t an afterthought. We offer expertise in configuring and implementing a variety of solutions to help organizations and individuals collaborate more effectively. Depending on your needs, we customize solutions based on cybersecurity, Agile development, knowledge management, learning and development, and program management. To ensure our clients achieve mission success, we developed a set of proven standards, processes, and methodologies that leverage recognized industry standards. We offer expertise in enterprise and portfolio solutions coupled with training. To learn more about our offerings, please contact us. H I R I N G Fort Meade  Acquisition Professional 2  Instructor - Project Management/Systems Engineering
  7. 7. 8 | P a g e FEDDATA Federal Data Systems (FEDDATA) has provided information technology services to commercial and Government markets since 2004. We specialize in the design, implementation and monitoring of automated systems with a corporate emphasis on data security, incident response, continuity of operations, and information assurance. FEDDATA engineers work with our clients to keep their data secure using hardware and software solutions including storage area networks, secure backup sites, automated data replication hardware and software, and network and data monitoring tools. FEDDATA makes full use of new technologies including cloud computing, virtual computing and Internet based tools to provide the most secure, cost-effective solutions that are technologically feasible to protect our client’s data. The company’s customers are primarily Government Agencies, Bureaus and Commissions located in Northern Virginia and Maryland. H I R I N G  Network Engineer  Software Engineer  Helpdesk Specialist Level 1 and 2  Language Analyst  System Administrator Level 1/2/3  Information Systems Security Officer  Information Systems Security Engineer  Cloud Administrator  Intelligence Analyst  Systems Engineer-Linux  Multi- Source Support Specialist  Digital Network Analyst  Principal Engineer  Intelligence Specialist
  8. 8. 9 | P a g e Integrity Technology Consultants Integrity Technology Consultants is a Woman-Owned Small-Business founded in 2003. ITC provides superior engineering and management consulting solutions to our clients. We are continually seeking highly- skilled, dedicated employees who pursue innovative solutions to our customers’ most complex challenges. Contracts:  Enterprise Systems Engineering & Architecture (ESEA II)  United States Cyber Command (USCC)  Enterprise Program Management (EPM III)  Enterprise Information Technology Operations (EITO)  Prestige WorldWide (PWW) Our Benefits  Above Market Salary  30 Days Leave  401(k) Matching @ 7.5%  Flexible Work Schedule  Comp-Time  Competitive Medical, Dental & Vision Insurance Please send resume’s and inquiries to Trish Stewart: H I R I N G  System Engineers  Software Developers  Cyberspace Analysts  Cyber Subject Matter Experts  Network Engineers  Acquisition Professionals  Financial Analysts  Help-Desk Personnel  Schedulers and more!
  9. 9. 10 | P a g e Leidos VISION To be a recognized global leader in solving important problems in National Security, Engineering and Health. Through the inspired work of our diverse employees, we will deliver innovative, scalable solutions for our customers. We will do this with sustainability in mind, while also caring for our employees and the communities in which we operate. MISSION Through our culture of innovation, we will develop deep customer trust and create enduring solutions that improve our world. VALUES INSPIRED to make a difference We are committed to solving the world’s toughest problems. We achieve this by connecting our employees’ knowledge and our superior technologies across Leidos in pursuit of answers. We know that by embracing the differences of all employees we will unlock the creativity and innovation that makes a difference. PASSIONATE about customer success We are determined to understand and respond to our customers’ needs as if they were our own. This plus our dedication to deliver superior results ensures that we will create solutions that lead our markets. UNITED as a team We are bound together by our conviction that ethics and integrity are core to how we operate. We engage with others from a basis of trust because we believe that everyone is doing his or her best and wants to do the right thing. Therefore, we collaborate and share to create value for our employees, our shareholders and our communities. INTEGRITY is the foundation for all that we do At Leidos we have a steadfast commitment to integrity and ethical behavior in all that we do. This includes interactions with employees, customers and our communities. H I R I N G  Network Threat Forensics Support Specialist  Cyber Analyst Support Specialist  Digital Network Intelligence Analyst  CND Analyst  SIGDEV Analyst  Mission Manager  Geospatial/FMV Analyst  Linguist  HUMINT Targeting Support Analyst  Information Systems Security Officer  Java Developer  Software Developer  Systems Administrator  Help Desk Specialist  Systems Engineer  Network Engineer  Configuration Manager  Web Developer  Remedy Developer  SharePoint Administrator  Desk Officer  Targeting Analyst  Cyber Security Engineer  Malware Specialist  Technical Writer  Solutions Architect  Data Scientist  DevOps Engineer  Oracle DBA  Toponymist
  10. 10. 11 | P a g e Mission Essential UNIQUE MISSIONS. BEST-IN-CLASS EXECUTION. Mission Essential Personnel, LLC is a veteran owned and operated partner to the Intelligence, Defense, and Law Enforcement communities. We have deployed thousands of analysts, operators, linguists and other specialists worldwide to support and serve alongside the U.S. Warfighter in some of the most austere and remote locations around the world. Mission Essential is your trusted source for comprehensive multi-disciplined Intelligence operations, Language and Socio- Cultural services, ISR, and Cyber. We deliver tailored solutions in Intelligence Analysis and Operations to U.S. Intelligence, Defense, and Law Enforcement customers around the world. We provide All-Source, SIGINT, CI/HUMINT, GEOINT, and OSINT professionals who enable mission success at the tactical, operational, and strategic levels. WHO WE ARE: Peerless talent using the most advanced technology to deliver mission essential, innovative solutions. WHO WE SERVE: Defense, diplomatic, intelligence community, and law enforcement customers, as well as multinationals and friendly foreign governments. HOW WE DO IT: Leverage top talent and a constellation of extraordinary partners. Low overhead, a flat organizational structure, a collaborative culture of crisp, real- time decision making and action to deliver the plan. Demonstrate unrivaled agility and efficiency by overcoming the obstacles that encumber large complex organizations. Provide clarity, certainty, urgency, and efficiency. EXPERIENCE: For over a decade, we have served customers at the strategic and tactical levels, providing operational solutions to the U.S. Departments of Defense, State, and Homeland Security; the Intelligence Community; friendly foreign governments; and multinational corporations. H I R I N G Quantico VA  Electronic Warfare  C3 Systems Analyst  Systems Analyst Augusta GA  Interface Engineer  Geolocation Operator Bethesda MD  Intelligence/Counter- intelligence Analyst Germany  Infrastructure Analyst  Weapons Safety Manager  SIGINT Analyst Aviano Italy  IT Project Manager
  11. 11. 12 | P a g e Northrop Grumman We are a close-knit community of big thinkers collaborating to keep the world safe. Our passion, creativity and expertise bring next-level technology solutions to life in autonomous systems, cyber, C4ISR, strike, space, and logistics and modernization for our customers around the globe. On the Northrop Grumman team, you’ll join our pursuit of excellence immersed in a dynamic culture of innovation and respect. Your unique perspective will help achieve our shared vision for the future of global security. Every step of the way, you'll be supported by world-class training, employee resource groups and a comprehensive benefits package that enables greater health and happiness for you and your family. Worldwide and across disciplines, we’re challenging what’s possible for technology to protect people and places from undersea to outer space and into cyberspace. And we see the impact of our performance every day. We are Northrop Grumman, and we work on what matters—now, you too can make a difference. Explore opportunities in engineering, IT, manufacturing, business management, cybersecurity and more at Northrop Grumman is committed to hiring and retaining a diverse workforce. We are proud to be an Equal Opportunity/Affirmative Action Employer, making decisions without regard to race, color, religion, creed, sex, sexual orientation, gender identity, marital status, national origin, age, veteran status, disability, or any other protected class. For our complete EEO/AA statement, please visit U. S. citizenship is required for most positions. H I R I N G  Cyber Information Systems Security Analyst  Windows Systems Administrator  Linux Systems Administrator  Airborne Systems Operator – Principal  Network Communications – All Levels  Avionics Technicians – Principal/ Sr Principal  Sr Principal Computer Systems Architect  Aircraft Mechanics – Principal/ Sr Principal  Database Support – Principal  Manager - Network Communications 2  Principal Configuration Analyst  Data Insight Analyst – Principal  Flight Simulation Trainer – Sr Principal  Pilot Unmannned Aerial Vehicle – Sr Principal  Industrial Security Analyst  Program Cost Schedule & Control Analyst – Sr Principal
  12. 12. 13 | P a g e Perspecta Every day at Perspecta, we enable hundreds of thousands of people to take on our nation’s most important work. We’re a company founded on a diverse set of capabilities and skills, bound together by a single promise: we never stop solving our nation’s most complex challenges. Our team of engineers, analysts, developers, investigators, integrators and architects work tirelessly to create innovative solutions. We continually push ourselves—to respond, to adapt, to go further. To look ahead to the changing landscape and develop new and innovative ways to serve our customers. Perspecta works with U.S. government customers in defense, intelligence, civilian, health care, and state and local markets. Our high-caliber employees are rewarded in many ways—not only through competitive salaries and benefits packages, but the opportunity to create a meaningful impact in jobs and on projects that matter. Perspecta’s talented and robust workforce—14,000 strong—stands ready to welcome you to the team. Let’s make an impact together. H I R I N G  System Engineers  Technical Writers  Configuration Management  Enterprise Architects  System Administrators  Acoustic Intelligence Analyst  Account Chief Technologist II  ASP.NET C# Developer  Business Operations / Deputy Program Manager  Business Process Consultant Senior Technical Specialist  Cyber Fires/Target Analyst  Cybersecurity Developer  Cyberspace Analyst  Director Cybersecurity Design & Engineering  Joint Operational Planner  Knowledge Management Analyst  Laboratory Engineering Technician  Operations Research Analyst IV APG MD  Scientist  Senior Project Manager  SharePoint Developer  Systems Engineer Principal Technical Specialist  Talent Manager  Technical Editor  Transition Manager  Web Developer Technical Specialist
  13. 13. 14 | P a g e Red Arch Solutions H I R I N G  Software Engineer – All Levels  System Engineer – All Levels  Cloud System Administrator  DNI Analyst  Cyber Analysis Support Specialist  CNO Planning & Support Specialist  Network Threat Support Specialist  CNO Developer  Hardware Technician - Entry Level  Help Desk Technician - All Levels  ISSE- Mid Level  ISSO-Mid Level  Network Engineer - All Levels  System Administrator - All Levels (Windows and Linux)  Logistician - All Levels Red Arch Solutions is a premier U.S. small business providing its customers with state-of-the-art tactical and strategic intelligence, systems, security and software engineering solutions, solving some of the most pressing and unique intelligence community challenges related to National Security. Our employees are exceptionally skilled professionals; individuals who are dedicated to collecting, analyzing, creating and engineering the best solutions in support of critical missions. Red Arch Solutions takes pride in the success of our customers. The depth of our engineers, experience combined with our breadth of exposure across the intelligence community enables us to provide value added, synergistic analytical and engineering support.
  14. 14. 15 | P a g e SAIC H I R I N G  Target Digital Network Analyst 2  Information Network Operations Planner  Senior DEVOPS Engineer  Systems Engineer (Cyber Network Operations Planner)  Jr Digital Network Intelligence Analyst New  Senior Network and Threat Support Specialist  Offensive Cyberspace Capabilities Requirements Planner  Offensive Cyber Operations Planner  Cyber Analyst  Cyber Network Operations Planner  Intelligence Collection Manager  Intel Analyst Sr  Software Developer  SIGINT Geospatial Analyst  Network Exploitation Analyst Make a Difference with SAIC As you consider a career at SAIC, you will find countless opportunities to contribute to solutions that are changing the world in real and measurable ways in our technical, engineering, intelligence, and enterprise IT business areas. Innovative Applications of Technology and Expertise We design, develop, and sustain offerings that empower diplomatic missions, support warfighter requirements, and advance exploration from the ocean floor to outer space. We maintain leadership positions in supply chain management, hardware integration, and global network integration. Our diversified contract base enables us to provide end-to-end capabilities and solutions across mission and enterprise lifecycles. We do all this with the constant and deliberate commitment to ethical performance and integrity that has marked SAIC since its founding. Supporting Programs of National Importance SAIC has a strong commitment to supporting programs of national importance—helping to solve or undertake our country’s most significant problems. We offer a broad range of services and solutions to address our customers' most complex and critical technology-related needs. SAIC's Core Values Our core values define our culture and the way in which we conduct business. They form the basis of our conduct and govern our decisions. At SAIC, how we behave is as important as the results we achieve. An underlying principle of our conduct is our commitment to uphold the highest ethical standards in ourselves and those around us.  Integrity Our culture of ingenuity is rooted in our passion for doing what is right and delivering on our commitments. Integrity, respect and trust have been an integral part of our company since day one and are fundamental to our decisions and behaviors.  Mission Understanding Our ingenuity starts with the understanding of our customers’ opportunities and challenges. Before we begin the process of designing a solution, we use our deep customer knowledge to define what’s needed to ensure mission success.  Empowerment Redefining ingenuity depends on team entrepreneurialism and empowerment for the good of the enterprise. Ingenuity happens when our people are encouraged to explore, leverage expertise and knowledge from across the company, accept responsibility for outcomes, and hold ourselves and others accountable for results.  Creativity We’re redefining ingenuity through our collective creativity. We build on the inventiveness and expertise of our exceptional people and our partners to quickly get to smarter and more innovative solutions.
  15. 15. 16 | P a g e Secure Technologies Group H I R I N G  Software Engineers  Systems Engineers  ISSO  ISSE  Acquisition Professional  Linguist  System Administrator Nothing is more important today than ensuring the security of our nation’s most vital intelligence systems and information. Headquartered in Annapolis, Maryland, Secure Technologies Group provides a broad array of Information Security technologies and services to improve the confidentiality, integrity and availability of our nation’s most critical information systems and networks. Experienced at solving today’s unique information security and technology challenges with best-practice solutions, policies and procedures, our dedicated team of certified professionals strives to engineer, integrate, deploy and manage solutions that meet the unique needs and goals of our customers. We offer a variety of expertise and services to the intelligence community, federal, state and local governments, and private sector including Operational Information Systems Security, Risk Management Framework/NISCAP/DITSCAP Certification & Accreditation, Vulnerability and Penetration Testing, IA Policy and Oversight, and Secure Systems Engineering and Design.
  16. 16. 17 | P a g e TechGuard Security H I R I N G  Tier II Helpdesk  SharePoint Developer  Exercise Officer  Readiness Officer  Training Officer  Cybersecurity Engineer  Cybersecurity Analyst  Cyberspace Joint Operations Planner  Web Developer  Cyberspace Fires (Targets) Analyst  Administrative Specialist  Knowledge Management Specialist  Software Developer  Business Process Engineer  Geospatial Analyst  Imagery Scientist  Full Motion Video Analyst  Quality Assurance Analyst TechGuard Security, LLC (TechGuard), has been a proven, trusted, and adaptive partner to the DoD, various Federal Agencies and Intelligence Community (IC) for over 18 years. TechGuard is ISO 9001: 2015 certified with an established quality management system and proven processes and methodologies to support government and corporate client requirements. Year after year, TechGuard wins prestigious awards for exceptional work in the security industry.
  17. 17. 18 | P a g e U.S. Cyber Command H I R I N G Please see the hiring representatives in our booth for open positions. USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. The Command has three main focus areas: Defending the DoDIN, providing support to combatant commanders for execution of their missions around the world, and strengthening our nation's ability to withstand and respond to cyber attack. The Command unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise. USCYBERCOM improves DoD's capabilities to operate resilient, reliable information and communication networks, counter cyberspace threats, and assure access to cyberspace. USCYBERCOM is designing the cyber force structure, training requirements and certification standards that will enable the Services to build the cyber force required to execute our assigned missions. The command also works closely with interagency and international partners in executing these critical missions. Learn more about USCYBERCOM here: Open Positions: The DoD Cyber Expected Service (CES) is an enterprise-wide approach for managing civilian cyber professionals across the Department. The CES is aligned to both Title 10 and Title 5 provisions in that it offers flexibilities for the recruitment, retention, and development of cyber professionals across Department. Under CES, USCYBERCOM now brings on new hires under the excepted service (GG grades) instead of the competitive service (GS grade). Experience is highly valued in the CES, which transcends the typical time-based approach in the competitive service. Promotions in the CES are qualification-based with no time-grade requirements required for advancement. Interested candidates can send inquiries and resumes to our recruiting inbox:
  18. 18. Join our group on LinkedIn View presentations on SlideShare Connect with us on Twitter @ClearedJobsNet Like our Facebook page Watch our YouTube channel Friend, fan or follow us on various social networks & online communities! ClearedJobs.Net | 703.871.0037 | Visit us online at www.ClearedJobs.Net