Join us Wednesday (register at http://clearedjobs.net/job-fair/fair/36/) at the Baltimore Convention Center to meet with cyber employers, network with other cyber professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Cyber Job Fair.
Gregory F. Witham is a senior IT architect with over 27 years of experience in identity and access management. He has extensive experience designing and implementing IBM security products like Tivoli Access Manager, Tivoli Federated Identity Manager, and WebSphere. His career history includes roles managing IAM teams and consulting for organizations across industries to design IAM architectures and migrate systems.
National Cyber Summit Job Fair June 5, 2019, HuntsvilleClearedJobs.Net
The document summarizes a cyber job fair being held on June 5th at the Von Braun Center in Huntsville, AL from 11am to 3pm. It provides logistics for the event, including resume review sessions, cell phone charging, name badge recycling, and completing a survey for a chance to win a $100 gift card. It then lists 14 companies attending the job fair that are hiring for various cybersecurity and IT positions, along with brief descriptions of each company.
This document is a proposal submitted by PCMJ Security Services in response to RFP Number 427.04-107-08 from the State Government Department of Finance and Administration for information security assessment services. The proposal outlines PCMJ's team members and certifications, as well as details about the company's experience, policies, and approach to performing the security assessment and developing policy frameworks for the State if selected for the project.
AboutWeb is a leading provider of technology solutions and services to government agencies and businesses since 1998. It offers innovation, technology solutions, experienced staff augmentation, and certified technology training. AboutWeb is a GSA IT solutions vendor and Microsoft certified partner with over 80 employees. It has experience as a prime and subcontractor on federal contracts and provides quality resources and solutions such as COTS integration, custom application development, web development, document management, and cyber security.
Gregory F. Witham is a senior consulting IT architect with over 27 years of experience in information technology, specializing in identity and access management. He has extensive experience designing and implementing IBM security products such as Tivoli Access Manager, Tivoli Federated Identity Manager, and WebSphere for clients in various industries. Mr. Witham has worked on numerous projects as both an architect and project manager, and has been a leader in IBM's identity and access management practice.
This document provides an analysis of the information security infrastructure of an e-commerce home improvement company called Web-Tech Home Improvement (WTHI). It finds that the company's current physical and information security systems are insufficient and need improvement. Specifically, it identifies weaknesses in physical access controls, video surveillance, and the need to upgrade outdated security systems. The document proposes improvements to the security of WTHI's four distribution centers and information systems to better protect customer data and maintain the company's competitive advantage in the home improvement market.
ZS Infotech is an IT support services and security solutions provider located in Selangor, Malaysia. They offer a full range of IT services customized for businesses, including acting as the client's internal IT department. Their services include IT staff augmentation, endpoint security, cyber security, risk management, and infrastructure management. For IT staff augmentation, they provide additional IT expertise on an as-needed basis. Their endpoint security protects company devices from threats. Cyber security helps secure companies from online threats. They assess risks and help with risk mitigation. And they manage clients' IT infrastructure services.
This document provides information about career opportunities in the Infrastructure Management Services (IMS) industry and certifications available to enter this field. IMS involves managing data, networks, and security either on-site or remotely and is worth over $200 billion globally. It discusses popular certifications from Microsoft, CompTIA, Oracle, Red Hat and others that validate skills in areas like system administration, networking, security, and databases. These certifications help professionals stand out, earn better salaries and ensure they have the latest skills as technology continues to change. Contact information is provided for an academic advisor to learn more about available programs.
Gregory F. Witham is a senior IT architect with over 27 years of experience in identity and access management. He has extensive experience designing and implementing IBM security products like Tivoli Access Manager, Tivoli Federated Identity Manager, and WebSphere. His career history includes roles managing IAM teams and consulting for organizations across industries to design IAM architectures and migrate systems.
National Cyber Summit Job Fair June 5, 2019, HuntsvilleClearedJobs.Net
The document summarizes a cyber job fair being held on June 5th at the Von Braun Center in Huntsville, AL from 11am to 3pm. It provides logistics for the event, including resume review sessions, cell phone charging, name badge recycling, and completing a survey for a chance to win a $100 gift card. It then lists 14 companies attending the job fair that are hiring for various cybersecurity and IT positions, along with brief descriptions of each company.
This document is a proposal submitted by PCMJ Security Services in response to RFP Number 427.04-107-08 from the State Government Department of Finance and Administration for information security assessment services. The proposal outlines PCMJ's team members and certifications, as well as details about the company's experience, policies, and approach to performing the security assessment and developing policy frameworks for the State if selected for the project.
AboutWeb is a leading provider of technology solutions and services to government agencies and businesses since 1998. It offers innovation, technology solutions, experienced staff augmentation, and certified technology training. AboutWeb is a GSA IT solutions vendor and Microsoft certified partner with over 80 employees. It has experience as a prime and subcontractor on federal contracts and provides quality resources and solutions such as COTS integration, custom application development, web development, document management, and cyber security.
Gregory F. Witham is a senior consulting IT architect with over 27 years of experience in information technology, specializing in identity and access management. He has extensive experience designing and implementing IBM security products such as Tivoli Access Manager, Tivoli Federated Identity Manager, and WebSphere for clients in various industries. Mr. Witham has worked on numerous projects as both an architect and project manager, and has been a leader in IBM's identity and access management practice.
This document provides an analysis of the information security infrastructure of an e-commerce home improvement company called Web-Tech Home Improvement (WTHI). It finds that the company's current physical and information security systems are insufficient and need improvement. Specifically, it identifies weaknesses in physical access controls, video surveillance, and the need to upgrade outdated security systems. The document proposes improvements to the security of WTHI's four distribution centers and information systems to better protect customer data and maintain the company's competitive advantage in the home improvement market.
ZS Infotech is an IT support services and security solutions provider located in Selangor, Malaysia. They offer a full range of IT services customized for businesses, including acting as the client's internal IT department. Their services include IT staff augmentation, endpoint security, cyber security, risk management, and infrastructure management. For IT staff augmentation, they provide additional IT expertise on an as-needed basis. Their endpoint security protects company devices from threats. Cyber security helps secure companies from online threats. They assess risks and help with risk mitigation. And they manage clients' IT infrastructure services.
This document provides information about career opportunities in the Infrastructure Management Services (IMS) industry and certifications available to enter this field. IMS involves managing data, networks, and security either on-site or remotely and is worth over $200 billion globally. It discusses popular certifications from Microsoft, CompTIA, Oracle, Red Hat and others that validate skills in areas like system administration, networking, security, and databases. These certifications help professionals stand out, earn better salaries and ensure they have the latest skills as technology continues to change. Contact information is provided for an academic advisor to learn more about available programs.
Information Security Officer Internet Resume Leon Blum CopyLblum1234
Leon Blum has over 20 years of experience in information security, technical support, and help desk management. He has worked for international banks and software companies. His experience includes managing user security administration, developing security monitoring systems, and implementing automated help desk systems. He has strong skills in operating systems, applications, networking, and security tools.
Security 360, LLC is a veteran-owned small business that provides cyber security solutions and information assurance consulting services. It is headquartered in Maryland and has over 25 years of experience supporting government agencies. It offers services such as penetration testing, vulnerability assessments, secure application development, and compliance with standards like FISMA and NIST. The company works with clients in industries like government, healthcare, and financial services to address challenges like implementing security requirements and maintaining compliance.
EMN Corporation provides a wide range of IT services and software development globally. They offer software development, testing, integrations, networking services, and consulting. EMN has partnerships with many technology companies and serves industries such as automotive, healthcare, telecom, and more. They have infrastructure in 6 branches worldwide to handle multiple projects and provide 24/7 support and services to clients.
All Clearances or Cyber Virtual Job Fair Handbook June 3, 2020, HuntsvilleClearedJobs.Net
If you're cleared, please visit https://clearedjobs.net/job-fair/fair/112/ to pre-register.
If you have cyber security experience and are a U.S. citizen please visit https://cybersecjobs.com/job-fair/fair/81/
Derek Mezack is an experienced security professional seeking a versatile role involving research, development, and training. He has extensive experience developing security solutions like SIEM platforms and intrusion detection signatures. He also led large penetration tests and provided security consulting, compliance assessments, and incident response. Mezack holds patents for threat modeling and security information management technologies. He aims to further his skills while taking on leadership, individual contributor, or training responsibilities.
1. The document summarizes a panel discussion on securing citizen-facing applications for government. It discusses challenges around involving business owners in security decisions, identifying citizens to access systems, and meeting different authentication standards.
2. The panelists debate centralized vs decentralized authentication approaches and discuss lessons around getting business support for security architecture.
3. In closing, the panel provides guidance to security architects, emphasizing identity as a service, database defense in depth, and conducting security health checks.
This document discusses the challenges of auditing emerging cyber threats and IT controls. It begins with a quote about competence becoming stale and the need for continuous learning. The document then covers topics like recent cybersecurity breaches, IT audit skills and certifications needed, emerging threats like social media and BYOD, and techniques like penetration testing and incident response planning. It emphasizes that maintaining technical skills is important for IT auditors to effectively audit new technologies and security risks.
Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across North America and employs over 1,600 people. As the Computer Security Manager, you are responsible for protecting GFI's information systems and data. However, the CEO believes IT can be outsourced to cut costs, leading to budget and staff cuts that concern the COO. You must address security issues to convince the CEO of the value an internal IT department provides.
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
-The Current Global Digital Threat Climate
-Cyber-Trends Against The U.S. Financial Service Sector
-Considerations Prior To Outsourcing
-Pitfalls In International Partnerships
-Communications, Connections, And Security Considerations Between Locations
-Dealing With Data Exposures
-5 Things You Can Do To Protect Your Existing Outsourcing Right Now
Session 2 10:30am-11:30am
-Technology Outsourcing Trends
-Secure Outsourcing Technologies
-Collaboration Methods With Remote Teams
-How To Connect People With The Right Information At The Right Time And The Right Place
-How To Connect People With Fellow Employees, Vendors, Partners Or Other External Contacts Outside Of the Organization
-Project Management Technology Of Remote Resources
Rapid Implementation Services provides identity management solutions including user provisioning, access management, and identity governance. The document discusses Oracle's identity management portfolio and new features in the 11gR2 release including simplified user interfaces, support for mobile, social, and cloud, and an integrated identity platform. It highlights customer feedback which has been positive about the new capabilities.
Why Have A Digital Investigative InfrastructureKevin Wharram
The document discusses the need for digital investigative infrastructure. It outlines the costs of data breaches, how data is stolen, and challenges in protecting data. Methods of data theft include portable storage devices, email, and exploiting vulnerabilities. The document recommends following an incident response plan if data is compromised, and describes how the EnCase digital investigative platform can help conduct thorough forensic investigations across the network to identify security incidents and data policy violations.
Identity Governance: Not Just For ComplianceIBM Security
View on-demand presentation: http://securityintelligence.com/events/identity-governance-not-just-for-compliance/
Did you know that proper identity governance will make your organization more secure? Between Separation of Duty violations, entitlement creep and insider threats, user IDs are the doorway to your organization and identity governance can be the deadbolt.
Join this webinar to learn how you can employ identity governance to not only simplify your audit process, but to safeguard your entire organization.
The document discusses information security and ISO 27001. It summarizes some common security incidents organizations face, such as password sharing or unsecured devices. It then introduces ISO 27001 as a framework that can help organizations establish an Information Security Management System to achieve security and assure stakeholders. ISO 27001 specifies requirements around topics like policies, asset management, access control, and incident response to maintain the confidentiality, integrity and availability of information.
MT88 - Assess your business risks by understanding your technology’s supply c...Dell EMC World
Customers, investors, governments, NGOs, and the media are increasing their demands on a company’s transparency. While financial disclosures are common, supply chain disclosure is growing in importance. Do you know if there are conflict minerals in your computing technology or whether student workers have been employed to build your technology? Find out what Dell is doing to protect your business and learn from thought leaders on how to assess your risks when purchasing technology.
View on-demand recording: http://securityintelligence.com/events/how-vulnerable-is-your-critical-data/
Data infrastructures are highly dynamic, with changes in accounts, configurations and patches occurring regularly. Within your data infrastructure you need to understand the data. Not all data is the same. You need to protect the data that is considered high risk. However, most organizations lack the centralized control or skilled resources to review changes systematically to determine if they have introduced security gaps. While there are no silver bullets, there are key steps organizations can take to understand and reduce their risk and lower TCO.
In this presentation, Luis Casco-Arias, Senior Product Manager for IBM Security Guardium, describes best practices for:
- Assessing vulnerabilities and exposures
- Locking down critical data in various environments
- Aligning remediation workflows to prevent breaches and policy violations
The document provides information about a cyber job fair being held on October 10th at the Grand Hyatt hotel from 11am to 3pm. It includes details about resume reviews, cell phone charging, a survey for job seekers, and a list of companies attending including Abacus Technology, Accenture Federal Services, Air Force Civilian Service, Alion Science and Technology, COLSA Corporation, Def-Logix, Deloitte, Diversified Technical Services, Inc., and their respective hiring needs and requirements.
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
This job fair handbook provides logistical information for a cleared job fair on September 7th at the DoubleTree BWI in Linthicum, MD. It outlines the schedule for resume reviews from 2-6pm, as well as locations for cell phone charging, recycling name badges, and completing a survey for a chance to win a $100 gift card. The handbook also provides information about 12 companies that will be present at the job fair, including their websites, brief descriptions and current job openings. The companies represent a variety of sectors including cybersecurity, IT, engineering, and government contracting.
Polygraph Only Cleared Job Fair Job Seeker Handbook March 12, 2015, BWI, MdClearedJobs.Net
PLEASE NOTE THE JOB FAIR HAS BEEN RESCHEDULED FROM MARCH 5 TO MARCH 12 DUE TO WEATHER. If you have a full scope or CI polygraph, please join us next Wednesday (register at http://clearedjobs.net/jobfair-information/86) at the DoubleTree BWI to meet with cleared facilities employers, attend briefings on security clearance reinvestigations, and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the cleared jobs they will be seeking to fill at the Cleared Job Fair. An active or current security clearance and polygraph are required to attend.
Information Security Officer Internet Resume Leon Blum CopyLblum1234
Leon Blum has over 20 years of experience in information security, technical support, and help desk management. He has worked for international banks and software companies. His experience includes managing user security administration, developing security monitoring systems, and implementing automated help desk systems. He has strong skills in operating systems, applications, networking, and security tools.
Security 360, LLC is a veteran-owned small business that provides cyber security solutions and information assurance consulting services. It is headquartered in Maryland and has over 25 years of experience supporting government agencies. It offers services such as penetration testing, vulnerability assessments, secure application development, and compliance with standards like FISMA and NIST. The company works with clients in industries like government, healthcare, and financial services to address challenges like implementing security requirements and maintaining compliance.
EMN Corporation provides a wide range of IT services and software development globally. They offer software development, testing, integrations, networking services, and consulting. EMN has partnerships with many technology companies and serves industries such as automotive, healthcare, telecom, and more. They have infrastructure in 6 branches worldwide to handle multiple projects and provide 24/7 support and services to clients.
All Clearances or Cyber Virtual Job Fair Handbook June 3, 2020, HuntsvilleClearedJobs.Net
If you're cleared, please visit https://clearedjobs.net/job-fair/fair/112/ to pre-register.
If you have cyber security experience and are a U.S. citizen please visit https://cybersecjobs.com/job-fair/fair/81/
Derek Mezack is an experienced security professional seeking a versatile role involving research, development, and training. He has extensive experience developing security solutions like SIEM platforms and intrusion detection signatures. He also led large penetration tests and provided security consulting, compliance assessments, and incident response. Mezack holds patents for threat modeling and security information management technologies. He aims to further his skills while taking on leadership, individual contributor, or training responsibilities.
1. The document summarizes a panel discussion on securing citizen-facing applications for government. It discusses challenges around involving business owners in security decisions, identifying citizens to access systems, and meeting different authentication standards.
2. The panelists debate centralized vs decentralized authentication approaches and discuss lessons around getting business support for security architecture.
3. In closing, the panel provides guidance to security architects, emphasizing identity as a service, database defense in depth, and conducting security health checks.
This document discusses the challenges of auditing emerging cyber threats and IT controls. It begins with a quote about competence becoming stale and the need for continuous learning. The document then covers topics like recent cybersecurity breaches, IT audit skills and certifications needed, emerging threats like social media and BYOD, and techniques like penetration testing and incident response planning. It emphasizes that maintaining technical skills is important for IT auditors to effectively audit new technologies and security risks.
Global Finance, Inc. (GFI) is a financial company that manages thousands of accounts across North America and employs over 1,600 people. As the Computer Security Manager, you are responsible for protecting GFI's information systems and data. However, the CEO believes IT can be outsourced to cut costs, leading to budget and staff cuts that concern the COO. You must address security issues to convince the CEO of the value an internal IT department provides.
Digital Outsourcing: Risks, Pitfalls, and Security Considerations Peter1020
-The Current Global Digital Threat Climate
-Cyber-Trends Against The U.S. Financial Service Sector
-Considerations Prior To Outsourcing
-Pitfalls In International Partnerships
-Communications, Connections, And Security Considerations Between Locations
-Dealing With Data Exposures
-5 Things You Can Do To Protect Your Existing Outsourcing Right Now
Session 2 10:30am-11:30am
-Technology Outsourcing Trends
-Secure Outsourcing Technologies
-Collaboration Methods With Remote Teams
-How To Connect People With The Right Information At The Right Time And The Right Place
-How To Connect People With Fellow Employees, Vendors, Partners Or Other External Contacts Outside Of the Organization
-Project Management Technology Of Remote Resources
Rapid Implementation Services provides identity management solutions including user provisioning, access management, and identity governance. The document discusses Oracle's identity management portfolio and new features in the 11gR2 release including simplified user interfaces, support for mobile, social, and cloud, and an integrated identity platform. It highlights customer feedback which has been positive about the new capabilities.
Why Have A Digital Investigative InfrastructureKevin Wharram
The document discusses the need for digital investigative infrastructure. It outlines the costs of data breaches, how data is stolen, and challenges in protecting data. Methods of data theft include portable storage devices, email, and exploiting vulnerabilities. The document recommends following an incident response plan if data is compromised, and describes how the EnCase digital investigative platform can help conduct thorough forensic investigations across the network to identify security incidents and data policy violations.
Identity Governance: Not Just For ComplianceIBM Security
View on-demand presentation: http://securityintelligence.com/events/identity-governance-not-just-for-compliance/
Did you know that proper identity governance will make your organization more secure? Between Separation of Duty violations, entitlement creep and insider threats, user IDs are the doorway to your organization and identity governance can be the deadbolt.
Join this webinar to learn how you can employ identity governance to not only simplify your audit process, but to safeguard your entire organization.
The document discusses information security and ISO 27001. It summarizes some common security incidents organizations face, such as password sharing or unsecured devices. It then introduces ISO 27001 as a framework that can help organizations establish an Information Security Management System to achieve security and assure stakeholders. ISO 27001 specifies requirements around topics like policies, asset management, access control, and incident response to maintain the confidentiality, integrity and availability of information.
MT88 - Assess your business risks by understanding your technology’s supply c...Dell EMC World
Customers, investors, governments, NGOs, and the media are increasing their demands on a company’s transparency. While financial disclosures are common, supply chain disclosure is growing in importance. Do you know if there are conflict minerals in your computing technology or whether student workers have been employed to build your technology? Find out what Dell is doing to protect your business and learn from thought leaders on how to assess your risks when purchasing technology.
View on-demand recording: http://securityintelligence.com/events/how-vulnerable-is-your-critical-data/
Data infrastructures are highly dynamic, with changes in accounts, configurations and patches occurring regularly. Within your data infrastructure you need to understand the data. Not all data is the same. You need to protect the data that is considered high risk. However, most organizations lack the centralized control or skilled resources to review changes systematically to determine if they have introduced security gaps. While there are no silver bullets, there are key steps organizations can take to understand and reduce their risk and lower TCO.
In this presentation, Luis Casco-Arias, Senior Product Manager for IBM Security Guardium, describes best practices for:
- Assessing vulnerabilities and exposures
- Locking down critical data in various environments
- Aligning remediation workflows to prevent breaches and policy violations
The document provides information about a cyber job fair being held on October 10th at the Grand Hyatt hotel from 11am to 3pm. It includes details about resume reviews, cell phone charging, a survey for job seekers, and a list of companies attending including Abacus Technology, Accenture Federal Services, Air Force Civilian Service, Alion Science and Technology, COLSA Corporation, Def-Logix, Deloitte, Diversified Technical Services, Inc., and their respective hiring needs and requirements.
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
Recent newsworthy data breaches have business and IT leaders asking, “Are we learning from the mistakes of others?” In an ever-increasing threat environment, security leaders face mounting pressures to deliver effective security capabilities that protect business assets while balancing budgets, security risks and regulatory issues.
For more information on Security, please visit: http://cainc.to/CAW17-Security
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
Many organizations have a solution to control the actions of privileged users. But that’s not enough for a complete privileged user management solution—you must also govern access to make sure that only the correct users have elevated privileges, and that they have only the privileges that they need. In this session, you will get an in-depth understanding of how you can reduce your risk through this capability unique to CA.
For more information on Security, please visit: http://cainc.to/CAW17-Security
This job fair handbook provides logistical information for a cleared job fair on September 7th at the DoubleTree BWI in Linthicum, MD. It outlines the schedule for resume reviews from 2-6pm, as well as locations for cell phone charging, recycling name badges, and completing a survey for a chance to win a $100 gift card. The handbook also provides information about 12 companies that will be present at the job fair, including their websites, brief descriptions and current job openings. The companies represent a variety of sectors including cybersecurity, IT, engineering, and government contracting.
Polygraph Only Cleared Job Fair Job Seeker Handbook March 12, 2015, BWI, MdClearedJobs.Net
PLEASE NOTE THE JOB FAIR HAS BEEN RESCHEDULED FROM MARCH 5 TO MARCH 12 DUE TO WEATHER. If you have a full scope or CI polygraph, please join us next Wednesday (register at http://clearedjobs.net/jobfair-information/86) at the DoubleTree BWI to meet with cleared facilities employers, attend briefings on security clearance reinvestigations, and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the cleared jobs they will be seeking to fill at the Cleared Job Fair. An active or current security clearance and polygraph are required to attend.
Join us next Tuesday (register at http://clearedjobs.net/cleared-jobfairs) at the DoubleTree BWI to meet with cleared facilities employers, attend briefings on security clearance reinvestigations and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the cleared jobs they will be seeking to fill at the Cleared Job Fair. An active or current security clearance is required to attend.
Do you possess an active TS/SCI, CI Poly or Full Scope Poly Security Clearance & looking for your next Cleared Career Opportunity?
Join us at the reStartEvents Nationwide TS/SCI & Above Cleared Virtual Career Fair on March 31st and engage with hiring managers and recruiters from a dozens of the nations leading defense contractors, all from the safety and comfort of your home or office. Accomplish what it would take weeks to do, ALL in one day at reStart!
reStart Nationwide TS/SCI & Above Cleared Virtual Career Fair
Thursday, March 31st, 2022
2pm - 5pm est
Details & Registration: https://tinyurl.com/yc6dzbnb
An Active TS/SCI or Above Security Clearance IS Required For This Event
Companies Interviewing:
• Leidos
• Northrop Grumman
• Abacus Technology Corporation
• Air Force Civilian Service
• Amazon Web Services
• AnaVation
• Applied Integrated Technologies
• Cisco
• Cubic Mission and Performance Solutions
• ICF
• Jacobs
• Lumen
• Markon Solutions
• Oasis Systems
• Oracle
• Solidus Technical Solutions
• Watermark Risk Management
• Xcellent Technology Solutions
Whether you are transitioning from the military or federal government, actively seeking employment, your contract is coming to an end or window shopping and want to see what else is out there for you, This Is The Event For You!
Positions available include: Software Engineers, Help Desk, Web Developers, Budget Analysts, Program / Project Managers, Acquisition Specialist, Cyber Security, DevOps Engineer, Storage Engineers, Aerospace Engineer, Systems Engineers, SharePoint Developer, Reverse Engineers, Intelligence Analysts, Network Engineers, Penetration Testers, JAVA Programmers, Data Scientist, Cloud Engineer, Information Systems Security, Administrative Assistants, Network Admins, Linguists, Full Stack Developers, LINUX Systems Admins and much more....
This event will be accessible to job seeking professionals with a minimum TS/SCI Security Clearance from coast to coast and will offer Cleared career opportunities both CONUS & OCONUS.
Please share this unprecedented event with ALL your TS/SCI & Polygraph Tested Security Cleared friends and colleagues.
Looking forward to having you join us online on March 31st
CyberTexas Job Fair August 20, 2019 San AntonioClearedJobs.Net
If you're cleared, please pre-register at https://clearedjobs.net/job-fair/fair/98/
If you're not cleared, please pre-register at https://cybersecjobs.com/job-fair/fair/77/
Poly Only Cleared Job Fair Job Seeker Handbook November 18, 2015, Dulles, VaClearedJobs.Net
If you have an active CI or FS polygraph please join us Wednesday (register at http://clearedjobs.net/job-fair/fair/30/) at the Hyatt Dulles to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Cleared Job Fair.
Cyber or Cleared Job Fair Job Seeker Handbook Feb 13, 2020 San AntonioClearedJobs.Net
The cyber or cleared job fair will be held on February 13 from 2-6pm at the Courtyard Marriott. The fair will offer resume reviews from 11am-3pm, cell phone charging, and attendees can recycle their name badges and complete a survey for a chance to win a $100 gift card. Several companies will be present at the fair hiring for various cybersecurity, IT, engineering, and government contracting positions that require security clearances.
All Clearances or Cyber Virtual Job Fair Handbook June 3, 2020, HuntsvilleClearedJobs.Net
The document provides information about a virtual cleared or cyber job fair being held on June 3rd from 11am to 3pm CDT. It includes logistics for job seekers such as information and resume review booths. It also includes notes pages for job seekers to take notes on employers they visit and any follow up needed. The document then provides information on several employers attending the fair, including Agile Defense, Air Force Civilian Service, ASRC Federal, Bevilacqua Research Corporation, Cisco, COLSA Corporation, Integration Innovation, Jacobs, Leidos and their available job postings.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/59/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
Cyber security professionals and students in a college-level program please join us at the CyberMaryland Job Fair to meet employers, network with other cleared professionals, and have your resume professionally reviewed. A security clearance is not required. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Cyber Job Fair. If you are a cyber security cleared professional please pre-register at: https://clearedjobs.net/job-fair/fair/65/. If you are a non-cleared cyber security professional or student please pre-register at: https://cybersecjobs.com/job-fair/fair/63/. The CyberMaryland Job Fair is free and registration is separate from the CyberMaryland conference.
Join us Oct 26 (register at http://clearedjobs.net/cleared-jobfairs) at the Sheraton BWI to meet with cleared facilities employers and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the cleared jobs they will be seeking to fill at the Cleared Job Fair. An active or current security clearance is required to attend.
Join us Thursday (register at clearedjobs.net/job-fair/fair/33/) at the Westin Tysons Corner to meet with cleared facilities employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the cleared jobs they will be seeking to fill at the Cleared Job Fair. An active or current security clearance is required to attend.
The document provides information about companies attending a cleared job fair, including AECOM, Booz Allen Hamilton, Cisco Systems, Constellation Technologies, FEDDATA, Integrity Technology Consultants, Leidos, Microsoft, Mission Essential, Point3 Security, and TMAC. Each company summary includes a brief description of the company and positions they are hiring for at the job fair.
The document provides information about a cleared job fair being held on October 21, 2010 at the Westin Tysons Corner hotel. It includes an agenda for the day with times and topics for resume reviews, informational sessions on working a job fair, interviewing, and the hidden job market. The document also lists some of the companies that will be present at the job fair, including Advanced Concepts, Applied Signal Technology, and CGI Federal. It provides brief descriptions of these three companies and lists some of the positions they are currently hiring for.
Huntsville All Clearances or Cyber Virtual Job Fair Handbook June 3ClearedJobs.Net
The document provides information about a virtual cleared or cyber job fair being held on June 3rd from 11am to 3pm CDT. It includes logistics for job seekers such as information and resume review booths. It also includes notes pages for job seekers to take notes on employers they visit with space for employer name and any follow up notes. The document then provides information pages for several employers attending the fair, including Agile Defense, Air Force Civilian Service, ASRC Federal, Bevilacqua Research Corporation, Cisco, COLSA Corporation, Integration Innovation Inc., Jacobs, Leidos and more.
Cleared Job Fair Job Seeker Handbook March 7, BWI, MDClearedJobs.Net
This document summarizes a poly-only cleared job fair that will take place on March 7th at the DoubleTree BWI in Linthicum, MD from 2pm to 6pm. It provides logistics for job seekers including resume review sessions, cell phone charging, recycling name badges, completing a survey to be entered to win a gift card, and recognizing top recruiting companies. The fair will have several cleared contracting companies in attendance looking to hire for positions such as developers, engineers, analysts and more.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/48/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
AboutWeb is a leading provider of technology solutions and services to government agencies and businesses since 1998. They offer innovation technology solutions, experienced staff augmentation, and certified technology training in areas such as J2EE server administration, security architecture, and custom application development. AboutWeb has experience as a prime contractor and subcontractor for many federal agencies, providing solutions such as COTS integration, software development, and network support.
If you have a CI or FS polygraph please join us (register at https://clearedjobs.net/job-fair/fair/74/) to meet with employers, network with other cleared professionals and have your resume professionally reviewed. The Job Seeker Handbook contains a listing of all employers and some of the positions they will be seeking to fill at the Poly-Only Cleared Job Fair.
Similar to Cyber Job Fair Job Seeker Handbook Oct 28, 2015, Baltimore, Md (20)
The Applied Research Laboratory at Penn State University conducts research and development to support national security, economic competitiveness, and quality of life. As a University Affiliated Research Center, ARL performs essential research free from conflicts of interest. ARL focuses on innovation, maturation, and implementation of new technologies in defense, national security, and other areas. ARL has addressed critical challenges for over 75 years and functions as a trusted partner to sponsors by taking a mission-focused approach.
CI or FS Poly Cleared Job Fair Handbook | March 6ClearedJobs.Net
This document provides information about several companies attending a cleared job fair, including Accenture Federal Services, AT&T, August Schell, BAE Systems, Boeing Intelligence & Analytics, CACI, and Constellation Technologies. For each company, it lists relevant contact information, a brief description of the company and services provided, and open positions requiring security clearances at various locations. The document encourages job seekers to complete a survey for a chance to win a $100 gift card and provides information on recognizing the top recruiting companies.
The document provides information about a Cleared Job Fair taking place on February 22nd including logistics for job seekers attending:
- An information booth will be available for questions
- A survey will be emailed after the event for feedback and a chance to win a $100 gift card
- The survey will ask job seekers to vote for the companies that provided the best recruiting experience
CI or FS Poly Cleared Job Fair Handbook | February 1ClearedJobs.Net
Accenture Federal Services, Arcfield, AT&T, BDO, General Dynamics - IT, Jacobs, and KBR were recruiting at a cleared job fair on February 1, 2023 from 2-5:30pm at the Westin Tysons Corner. The document provided information on each company, positions they were hiring for, and location requirements. Attendees were asked to complete a survey to provide feedback on the recruiters and be entered to win a $100 gift card. Eleccion, ManTech, and VTG Defense were not participating in-person but would receive resumes.
Maximize the Return on Your Cleared Job Fair InvestmentClearedJobs.Net
ClearedJobs.Net provides employer services for recruiting cleared professionals including resume database searching, job postings, advertising, and hiring events. Their services help employers build a comprehensive strategy for attracting cleared talent. They offer resume searching, flexible job posting packages, hiring events like job fairs and conferences, and advertising options like banner ads and emails. ClearedJobs.Net aims to make the hiring process easy and help employers find qualified cleared candidates.
The document provides information about an upcoming cleared job fair hosted by All Clearances Virtual on November 15th from 2-5pm ET. It lists the logistics of the event, including an information booth, resume review booth, post-event survey where participants can win a $100 gift card, and recognizing the top companies as "Best Recruiters" based on participant surveys. It then provides profiles of several companies, like Amentum, General Dynamics - IT, GovCIO, L3Harris Technologies | Space & Airborne Systems, and Leidos that will be present at the job fair and are hiring for various cleared positions.
CI or FS Poly Cleared Job Fair Handbook | November 2ClearedJobs.Net
The document provides information about a cleared job fair to be held on November 2nd in Tysons Corner, Virginia. It includes details about activities at the job fair such as completing a survey for a chance to win a gift card and getting quick resume reviews. The rest of the document profiles 15 companies that will be present at the job fair, providing brief descriptions of each company and lists of open positions requiring security clearances.
The document describes Envisioneering, Inc., a small business that provides scientific and engineering services to the US military across areas like directed energy, sensors, and logistics support. It has 30 years of experience meeting national defense and technology development needs through a team of experts. The company values technical excellence, integrity, and providing responsive, cost-effective solutions to help customers meet their needs. It strives to support employees through competitive benefits and opportunities for growth.
The document provides information about the National Cyber Summit Job Fair taking place on September 20th in Huntsville, Alabama. It includes details about the event logistics like a job seeker survey to provide feedback and enter to win a prize, resume review sessions, and a floorplan listing the employer booths in attendance. Several employers like Agile Defense, Air Force Civilian Service, Arcfield, BAE Systems, CAE USA and others are highlighted with brief descriptions and current job openings requiring different security clearances.
CI or FS Poly Cleared Job Fair Handbook | September 7ClearedJobs.Net
This document provides information about a cleared job fair, including logistics for job seekers attending the event. It also profiles 13 companies that will be present at the job fair, listing some of their open positions that require security clearances. The fair is on September 7th at a hotel in Maryland and encourages job seekers to complete a survey for a chance to win a gift card.
The document provides information about a cleared job fair, including logistics for job seekers attending. It outlines that job seekers should complete a survey for a chance to win a gift card and can vote for the best recruiters. It then profiles 13 companies attending the job fair, listing open positions requiring security clearances at each company.
Many job postings in the cleared community are pulled straight from the government contract award. While you can’t change the requirements of the job, you do have some flexibility in how you choose to advertise it. Improve your job postings to meet their full potential with these tips.
The document announces an all-virtual cleared job fair on July 19th from 2-5pm ET, providing information on the information booth, resume review booth, post-event survey where participants can win a $100 gift card, and how participants' survey responses will determine the "Best Recruiter."
CI or FS Poly Cleared Job Fair Handbook | June 7ClearedJobs.Net
The document provides information about a cleared job fair taking place on June 7th from 2pm to 5:30pm at the Westin Tysons Corner. It includes logistics for job seekers such as completing a survey for a chance to win a $100 gift card, resume reviews on a first come first served basis, and recognizing the top recruiting companies as voted by job seekers. It then provides information about 10 companies that will be present at the job fair, including their location, security clearance requirements, and open positions.
GovCIO is a government IT company that was founded by a Navy veteran and consultant to bring fresh ideas to government IT using agile methods. They deliver high-value IT solutions and services to transform how government works for customers like the US military and Health and Human Services. GovCIO has grown from two founders at a kitchen table to over 2,000 employees while maintaining their founding mission and culture of prioritizing customers. They are hiring for various IT positions across the country.
CI or FS Poly Cleared Job Fair Handbook | May 4ClearedJobs.Net
This document provides information about a cleared job fair being held on May 4th from 2-5:30pm at The Hotel at Arundel Preserve. It outlines the logistics of the event including opportunities to complete a survey for a chance to win a gift card, get resume reviews, and vote for the best recruiter. It also includes brief descriptions and contact information for 13 companies that will be present at the job fair, such as AT&T, BAE Systems, Ball Aerospace, CACI, COMSO, and General Dynamics, who are hiring for positions requiring security clearances.
The document provides information about a cleared job fair being held on April 13th from 2-6pm at the Westin Tysons Corner hotel. It lists some of the logistics and services available at the fair, including completing a survey for a chance to win a $100 gift card, getting resume reviews from recruiters, and voting for the best recruiter. It then provides brief descriptions of 10 companies that will be present at the fair, including the types of jobs they are hiring for and the security clearance levels required.
Building Meaningful Talent Communities with AI - Heather Pysklywec - SocialHR...SocialHRCamp
Speaker: Heather Pysklywec
Digital transformation has transformed the talent acquisition landscape over the past ten years. Now, with the introduction of artificial intelligence, HR professionals are faced with a new suite of tools to choose from. The question remains, where to start, what to be aware of, and what tools will complement the talent acquisition strategy of the organization? This session will give a summary of helpful AI tools in the industry, explain how they can fit into existing systems, and encourage attendees to explore if AI tools can improve their process.
Accelerating AI Integration with Collaborative Learning - Kinga Petrovai - So...SocialHRCamp
Speaker: Kinga Petrovai
You have the new AI tools, but how can you help your team use them to their full potential? As technology is changing daily, it’s hard to learn and keep up with the latest developments. Help your team amplify their learning with a new collaborative learning approach called the Learning Hive.
This session outlines the Learning Hive approach that sets up collaborations that foster great learning without the need for L&D to produce content. The Learning Hive enables effective knowledge sharing where employees learn from each other and apply this learning to their work, all while building stronger community bonds. This approach amplifies the impact of other learning resources and fosters a culture of continuous learning within the organization.
How to Leverage AI to Boost Employee Wellness - Lydia Di Francesco - SocialHR...SocialHRCamp
Speaker: Lydia Di Francesco
In this workshop, participants will delve into the realm of AI and its profound potential to revolutionize employee wellness initiatives. From stress management to fostering work-life harmony, AI offers a myriad of innovative tools and strategies that can significantly enhance the wellbeing of employees in any organization. Attendees will learn how to effectively leverage AI technologies to cultivate a healthier, happier, and more productive workforce. Whether it's utilizing AI-powered chatbots for mental health support, implementing data analytics to identify internal, systemic risk factors, or deploying personalized wellness apps, this workshop will equip participants with actionable insights and best practices to harness the power of AI for boosting employee wellness. Join us and discover how AI can be a strategic partner towards a culture of wellbeing and resilience in the workplace.
AI Considerations in HR Governance - Shahzad Khan - SocialHRCamp Ottawa 2024SocialHRCamp
Speaker: Shahzad Khan
This session on "AI Considerations in Human Resources Governance" explores the integration of Artificial Intelligence (AI) into HR practices, examining its history, current applications, and the governance issues it raises. A framework to view Government in modern organizations is provided, along with the transformation and key considerations associated with each element of this framework, drawing lessons from other AI projects to illustrate these aspects. We then dive into AI's use in resume screening, talent acquisition, employee retention, and predictive analytics for workforce management. Highlighting modern governance challenges, it addresses AI's impact on the gig economy as well as DEI. We then conclude with future trends in AI for HR, offering strategic recommendations for incorporating AI in HR governance.
Your Guide To Finding The Perfect Part-Time JobSnapJob
Part-time workers account for a significant part of the workforce, including individuals of all ages. A lot of industries hire part-time workers in different capacities, including temporary or seasonal openings, ranging from managerial to entry-level positions. However, many people still doubt taking on these roles and wonder how a temporary part-time job can help them achieve their long-term goals.
Start Smart: Learning the Ropes of AI for HR - Celine Maasland - SocialHRCamp...SocialHRCamp
Speaker: Celine Maasland
In this session, we’ll demystify the process of integrating artificial intelligence into everyday HR tasks. This presentation will guide HR professionals through the initial steps of identifying AI opportunities, choosing the right tools, and effectively implementing technology to streamline operations. Additionally, we’ll delve into the specialized skill of prompt engineering, demonstrating how to craft precise prompts to enhance interactions between AI systems and employees. Whether you’re new to AI or looking to refine some of your existing strategies, this session will equip you with the knowledge and tools to harness AI’s potential in transforming HR functions.
The Rules Do Apply: Navigating HR ComplianceAggregage
https://www.humanresourcestoday.com/frs/26903483/the-rules-do-apply--navigating-hr-compliance
HR Compliance is like a giant game of whack-a-mole. Once you think your company is compliant with all policies and procedures documented and in place, there’s a new or amended law, regulation, or final rule that pops up landing you back at ‘start.’ There are shifts, interpretations, and balancing acts to understanding compliance changes. Keeping up is not easy and it’s very time consuming.
This is a particular pain point for small HR departments, or HR departments of 1, that lack compliance teams and in-house labor attorneys. So, what do you do?
The goal of this webinar is to make you smarter in knowing what you should be focused on and the questions you should be asking. It will also provide you with resources for making compliance more manageable.
Objectives:
• Understand the regulatory landscape, including labor laws at the local, state, and federal levels
• Best practices for developing, implementing, and maintaining effective compliance programs
• Resources and strategies for staying informed about changes to labor laws, regulations, and compliance requirements
Becoming Relentlessly Human-Centred in an AI World - Erin Patchell - SocialHR...SocialHRCamp
Speaker: Erin Patchell
Imagine a world where the needs, experiences, and well-being of people— employees and customers — are the focus of integrating technology into our businesses. As HR professionals, what tools exist to leverage AI and technology as a force for both people and profit? How do we influence a culture that takes a human-centred lens?
Watch this expert-led webinar to learn effective tactics that high-volume hiring teams can use right now to attract top talent into their pipeline faster.
1. Cyber Job Fair
Job Seeker Handbook
#CyberJobFair
Wednesday, October 28
Baltimore Convention Center
One West Pratt St. Baltimore, MD
NetClearedJobs
2. Welcome to the Cyber Job Fair!
Resume Reviews
11am-3pm, Resume Reviews
These are quick 5 minute sessions where a job seeker can review their resume directly with
HR Constultant Patra Frame. We offer these sessions on a first-come, first-serve basis and
they fill up fast. The reviewer breaks for lunch at approximately 12:30pm.
Recycle Name Badge and Complete Survey
Please recycle your name badge in the red bowl before leaving the Cleared Job Fair.
Complete your Job Seeker survey and drop in the red bowl to be entered to win a $100 gift
card.
Employer Key in the Upper Right Hand Corner of Each Page
Security Clearance Required - All positions require that you already possess a security
clearance.
Cleared and Non-Cleared Professionals - These firms are open to speaking with both
cleared and non-cleared job seekers.
3. Cyber Job Fair – Baltimore Convention Center
October 28, 2015
Braxton
-Grant
LG-TEK
Northrop
Grumman
ENSCO
Millennium
AT&T
Deloitte
Prime
Solutions
BAE
780th
MI
Cyber
Leidos
ManTech
Steel
Point
ICF
Int’l
Lockheed
Martin
Vencore
Trace
Systems
BAH
Riverside
Fidelis
JPMorgan
Chase
InfoReliance SAIC
NSA
Engility
TASC
HP
MITRE
Entrance Entrance Entrance
4. Cleared and Non-Cleared
Professionals
780th MI Cyber Brigade
14900 Conference Center Drive
Chantilly, VA 20151
cyberspaceskills.com
The 780th Military Intelligence Brigade, the Army’s first
high-tech cyber start-up, is searching for the best and
brightest civilian cyber talent. The unit, comprised of civil-
ian and military professionals, adds new capabilities and
capacities to the US arsenal for operations in the cyber
war fighting domain.
Hiring
INSCOM is seeking both ex-
perienced cyber professionals
with at least three years of
work experience in the field
and recent college graduates
with degrees in IT, Engineering
and Mathematics.
Cyber Capabilities Devel-
oper
Federal Civil Service – U.S.
Army (non-military)
Ft. Meade MD; Ft. Gordon GA;
San Antonio TX
Interactive On-Net Operator
Federal Civil Service – U.S.
Army (non-military)
Ft. Meade MD; Ft. Gordon GA;
San Antonio TX
Digital Network Intelligence
Analyst
Federal Civil Service – U.S.
Army (non-military)
Ft. Meade MD; Ft. Gordon
GA; San Antonio TX
5. Security Clearance
Required
AT&T Government Solutions
1900 Gallows Road
Vienna, VA 22182
www.att.com
When our armed forces battle emerging IT challenges,
they call AT&T Government Solutions into active duty.
Why? Because we can quickly mobilize a team of ex-
perts to support your unit in the areas of IT systems de-
velopment, network management, communications, pro-
fessional services, and more.
Leave it to our experienced staff to deliver and manage
the technologies behind complex and large-scale sys-
tems, so you can focus on defending our nation's inter-
ests, here and abroad.
Think of us as one of your strongest allies to help you:
Increase efficiencies within the ranks through solu-
tions customized to your branch's needs
Minimize vulnerabilities by strengthening logical and
physical security measures
Reduce paperwork and processes associated with ini-
tiating new task orders
Prepare and train forces at home station or in the field
with integrated virtual, live and constructive systems
Leverage new technologies while maintaining invest-
ment in legacy systems with voice over IP (VoIP)
Hiring
Cyber Security Specialist
Intermediate
Cyber Security Specialist
Associate
Cyber Security Specialist
Lead
Cyber National Defense
Operations Analysts Associ-
ate
Cyber National Defense
Operations Analysts Inter-
mediate
Cyber National Defense
Operations Analysts Lead
Cyber Senior Consultant
Cyber Subject Matter Ex-
pert Associate
Cyber Subject Matter Ex-
pert Intermediate
Cyber Subject Matter Ex-
pert Lead
6. Security Clearance
Required
BAE Systems
8201 Greensboro Drive
McLean, VA 22102
www.baesystems.com
Defending freedom is no easy feat. It takes drive, pas-
sion and an unwavering commitment to excellence. It
also takes innovative defense, security and aerospace
solutions designed to protect the freedoms that we cher-
ish.
At BAE Systems, our mission is to design and deliver ad-
vanced defense, aerospace and security solutions that
keep our nation at the forefront of modern technology.
We’re working on the platforms, tools, technology and
services our customers need to perform at the highest
level in meeting all types of modern challenges—air,
land, sea, intelligence and cyberspace.
To learn more about BAE Systems and our current job
opportunities, please visit BAESYSTEMS.JOBS.
Hiring
Systems Administrator
Software Developer (Java)
Software Developer (Cloud)
Software Engineer (GUI)
Information Security Sys-
tems Engineer (ISSE)
Cyber Engineer
Cyber Analyst
Lead Cyber Engineer
Principal Cyber Engineer
All-Source Cyber Engineer/
Analyst
Open-Source Cyber Engi-
neer/Analyst
Cyber Operations Specialist
Java Software Engineer/
Developer
.Net Software Engineer/
Developer
.Net UI Developer
Hadoop Developer
Java ETL Developer
7. Security Clearance
Required
Booz Allen Hamilton
134 National Business Park
Annapolis Junction, MD 20701
www.boozallen.com
Booz Allen Hamilton has been at the forefront of strategy
and technology consulting for nearly a century. Today,
the firm provides services primarily to the US govern-
ment in defense, intelligence, and civil markets, and to
major corporations, institutions, and not-for-profit organi-
zations. Booz Allen offers clients deep functional knowl-
edge spanning strategy and organization, engineering
and operations, technology, and analytics—which it com-
bines with specialized expertise in clients’ mission and
domain areas to help solve their toughest problems.
Booz Allen is headquartered in McLean, Virginia, em-
ploys approximately 25,000 people, and had revenue of
$5.86 billion for the 12 months ended March 31, 2012. To
learn more, visit www.boozallen.com. (NYSE: BAH)
Hiring
Cloud Software Engineer
Java Developer
Systems Engineer
Network Analyst
Network Engineer
Operations Research Analyst
SIGINT Development Analyst
CNO Embedded Programmer
Systems Administrator
Cyber Exercise Planner
Cloud Systems Administrator
Electronics/Systems Engineer
Computer Architecture Engineer
Telecommunications Technician
Process Analyst
Test Engineer
Business Continuity Planner
Acquisitions Professional
InfoSys Security Engineer
Mathematical Modeling Analyst
Instructional Developer
SIGINT Specialist
Cyber Training Scenario Devel-
oper
8. Cleared and Non-Cleared
Professionals
Braxton-Grant Technologies
7180 Troy Hill Drive, Suite B
Elkridge, MD 21075
www.braxtongrant.com
Founded in 1997, Braxton-Grant Technologies, Inc., (BGTech) is a
customer focused Cyber Security consulting firm, specializing in
network and data security. BGTech offers leading edge integration
solutions to meet and exceed the ever-changing needs of today's
dynamic network security environment by providing a range of ser-
vices with an emphasis on information and cyber security.
Services include: Hardware & Software Sales, Training, Support
Desk, and Professional Services such as Information Security Ar-
chitecture and Engineering, Network Assessments, Vulnerability
Scanning and Analysis, and Product Implementation.
Service Portfolio includes:
Cyber Security (Risk & Vulnerability Assessment)
Product Deployment/Implementation (Short and Long Term)
BGTech Labs (Pre-sales Engineering)
Product Support and Training
BGTech can support vendor needs whether it be for procurement
of vendor products, training, or support. Braxton-Grant Profes-
sional Services applies a broad range of Security, Technology,
and Product Best Practices to help organizations protect re-
sources and enable users in a cost-effective, yet secure manner.
Our experience and insights span a wide variety of government
agencies, commercial industries, and technologies. We have engi-
neers who are fully cleared to support your environment.
The BGTech team takes the time to understand requirements, or-
ganization risk profile, key assets and key resources in addition to
security and network issues. This comprehensive approach allows
us to make the proper recommendations and develop solutions
that meet any individualized business model.
BGTech deliver’s services to Commercial and Government high
security agencies. BGTech operates with immediate availability in
MD, DC and VA areas. BGTech also provides services nationwide
as well as internationally, pending scheduled access.
Hiring
Cleared Positions
AIG - F5 Administrator
Database Administrator / SQL
& MySQL
Help Desk Support (Help
Desk Specialist Level 1 or
Level 2)
Help Desk Trainer
Identity Management - LDAP
Admin
Information Systems Security
Engineer (ISSE) A&A, C&A
Information Systems Security
Officer (ISSO)
Linux Network Admin/AWS
Network Administrator
Network Engineer Profes-
sional
Network Problem Resolution
Technician
NT/Unix Technician for Local
Support
PHP Developer
SC-Service Desk-Tier 224x7
Tech
SharePoint Developer/
Administrator
Storage Engineer
Systems Administrator
(UNIX / LINUX)
Systems Architect
Systems Engineer
Cleared & Non-Cleared Positions
Deployment Technician
Desktop Support
Java Developer
Tier 1 Support
9. Cleared and Non-Cleared
Professionals
Deloitte
1919 N. Lynn Street
Arlington, VA 22209
www.deloitte.com
In the United States, Deloitte LLP and its subsidiaries have 57,000
professionals with a single focus: serving our clients and helping
them solve their toughest problems. We work in four key business
areas — audit, financial advisory, tax and consulting — but our
real strength comes from combining the talents of those groups to
address clients’ needs. Fortune andBusinessWeek consistently
rank our organization among the best places to work, which is
good news for our talent and our clients alike. When the best peo-
ple tackle the most compelling challenges, everyone wins.
“Deloitte” is the brand under which approximately 169,000 dedi-
cated professionals in independent firms throughout the world col-
laborate to provide audit, consulting, financial advisory, risk man-
agement, and tax services to selected clients. These firms are
members of Deloitte Touche Tohmatsu (“DTT”), a Swiss Verein.
Each member firm provides services in a particular geographic
area and is subject to the laws and professional regulations of the
particular country or countries in which it operates. DTT helps co-
ordinate the activities of the member firms but does not itself pro-
vide services to clients. DTT and the member firms are separate
and distinct legal entities, which cannot obligate the other entities.
DTT and each DTT member firm are only liable for their own acts
or omissions, not those of any other entity. Each DTT member firm
is structured differently in accordance with national laws, regula-
tions, customary practice and other factors, and may secure the
provision of professional services in their territories through sub-
sidiaries, affiliates, and/or other entities. In the United States,
Deloitte LLP is the member firm of DTT. Like DTT, Deloitte LLP
does not provide services to clients. Instead, services are primarily
provided by the subsidiaries of Deloitte LLP, including:
Deloitte & Touche LLP
Deloitte Consulting LLP
Deloitte Financial Advisory Services LLP
Deloitte Tax LLP
Deloitte LLP helps coordinate the activities of these subsidiaries.
Deloitte LLP and these subsidiaries are separate and distinct legal
entities. Each of these subsidiaries is organized under Delaware
law, is separately capitalized, has its own Chairman and CEO and
Board of Directors, and provides a distinct array of services.
Hiring
Python Security Developers
and Engineers
Linux Engineers
Information Assurance Ana-
lysts (NIST 800-53 and
FISMA)
ICAM
Security Engineers
IdAM Engineers
Reverse Engineers
Information System Secu-
rity Engineer
10. Cleared and Non-Cleared
Professionals
Engility
3750 Centerview Drive
Chantilly, VA 20151
www.engilitycorp.com
Engility is an entirely new government services provider with over 40 years of combined
experience across nearly 70 different legacy companies. Headquartered in Chantilly, VA,
Engility was launched in July 2012 as a spin-off company of L-3 Communications.
We provide government services in engineering, professional support and mission sup-
port to customers in the U.S. Department of Defense, numerous Federal civilian agen-
cies as well as allied foreign governments.
Our core offerings include SETA Support, Professional Services, Education and Train-
ing, Operational Support, Logistics, International Capacity Development.
What We Stand For - Mission, Vision & Values:
Our Vision:
To be the first and best choice for our global customers, employees and investors. We
make and meet commitments. We perform with integrity. We are a top mission partner
whenever, wherever our customers need us.
Our Mission:
To enable our customers to achieve theirs. We meet commitments with total customer
focus – applying experience, agility, discipline and integrity to get the job done.
Our Values:
•Customer-Focused
We anticipate and meet the needs of our customers with expertise, efficiency and relent-
less focus on exceeding their expectations. Engility's "Your Mission. Our Commitment."
tagline is our guiding principle.
•Differentiated
By fostering a culture of continuous improvement and a spirit of innovation, Engility will
be the best government services company for our customers, our employees and our
investors. We will stand out from the pack as a differentiated services provider and em-
ployer in an increasingly commoditized market.
•Servant Leadership
Every position in the company contributes to the success of our employees who serve
our customers.
•Earned Trust
We will earn the trust of our customers by delivering excellent performance in an ethical
way. We will earn the trust of our employees by maintaining a culture based on an un-
wavering commitment to the highest ethical standards; we will treat each other with re-
spect. We will earn the trust of our investors by delivering consistent, dependable, indus-
try-leading financial results.
Headquartered in Chantilly, VA, Engility provides government services in engineering,
professional support, and mission support to customers in the U.S. Department of De-
fense, Federal civilian agencies, and allied foreign governments. Launched in July 2012
as a spin-off company of L-3 Communications, Engility’s 2012 revenues were estimated
to be about $1.6 billion.
Hiring
Information Assurance
Technical Analyst, 14704
Program Analyst, 13495
Senior Java Software Engi-
neer, 6911
SQL Database Administra-
tion Specialist, 9814
Java Software Engineer,
12267
Cyber Security Penetration
Tester, 14652
Cyber Systems Security As-
sessor, 14706
Database Cyber Systems
Security Assessor, 14713
Information Assurance / Cy-
ber Security, 12689
11. Security Clearance
Required
ENSCO
5400 Port Royal Road
Springfield, VA 22151
www.ensco.com
ENSCO, Inc. provides engineering, science and ad-
vanced technology solutions for the defense, security,
transportation and aerospace industries. The company is
privately held and has a history of innovation spanning
four decades. ENSCO is headquartered near Washing-
ton, D.C., with field offices throughout the United States
and representatives around the world.
From signal processing algorithms that support national
security, to railroad track monitoring equipment that
make train travel safer, ENSCO supports government
and industry organizations with a variety of solutions to
make the world a safer place.
Hiring
Reverse Engineers
Sr. Reverse Software Engi-
neer
Cyber Operations Lead
Sr. Embedded SW Engi-
neer
12. Cleared and Non-Cleared
Professionals
Fidelis Cybersecurity
4416 East West Hwy
Bethesda, MD 20814
www.fidelissecurity.com
Fidelis Cybersecurity provides organizations with a ro-
bust, comprehensive portfolio of products, services, and
expertise to combat today's sophisticated advanced
threats and prevent data breaches. Our commercial en-
terprise and government customers around the globe
can face advanced threats with confidence through use
of our Network Defense and Forensics Services, deliv-
ered by an elite team of cybersecurity professionals with
decades of hands-on experience, and our award-winning
Fidelis XPS™ Advanced Threat Defense Products,
which provide visibility and control over the entire threat
life cycle.
Hiring:
Bethesda MD
2015-1025-Principal C++ En-
gineer
2015-1027-Principal Test En-
gineer
2015-1032-QA Manager
2015-1034-Sr C++ Engr
2015-1035-Senior Front End
UI Engineer - Javascript
2015-1055-Software Arch
2015-1058-Software/Systems
Test Engineer - Network Se-
curity
2015-1066-Test Engineer
2015-1029-Sr. Product Mgr
2015-1012-Cloud Security
Engineer
2015-1013-Cloud Security
Engineer
2015-1282-Cloud Security
Engineer
2015-1064-Sr. Technical
Product Manager
2015-1067-Threat Intelligence
Senior Manager
13. Security Clearance
Required
HP
13600 EDS Drive
Herndon, VA 20171
www.hp.com
HP creates new possibilities for technology to have a mean-
ingful impact on people, businesses, governments and soci-
ety. As the world’s largest technology company, HP brings
together a portfolio that spans printing, personal computing,
software, services and IT infrastructure to serve more than 1
billion customers in over 170 countries on six continents. HP
invents, engineers, and delivers technology solutions that
drive business value, create social value, and improve the
lives of our clients. And at HP, we know that our people and
values are the most important elements of this success.
At HP, we believe in the power of ideas. From cutting edge
personal digital equipment to the most powerful IT solutions,
we use ideas to put technology to work for everyone. And we
believe that ideas thrive best in a culture of teamwork. That is
why everyone—at every level in every function—is encour-
aged to have original ideas, to express them and to share
them. We believe anything can be achieved if you really be-
lieve in it, and we will invest in your ideas to change lives and
the way people work. This vision is what sets us apart as a
company.
At HP we work across borders, and without limits. Global vir-
tual teams share resources and pool their big ideas to solve
business issues and meet personal goals. Everyone is val-
ued for the unique skills, experiences and perspective they
bring. That’s how we work at HP. And it’s how ideas—and
people—grow.
We’re looking for visionaries who are ready to make an im-
pact on the way the world works. And we’ll provide the sup-
port and brilliant teams to help you reach your dreams. At
HP, the future’s yours to create. Join us: Learn more about
our diverse portfolio, amazing people and vibrant culture. You
can check out HP jobs that match your profile, and speak di-
rectly with an HP recruiter!
Hiring
Cyber Security Specialist
Identity Management Engi-
neer
Information Security Sys-
tems Engineer
Information Security Spe-
cialist
Information Assurance Miti-
gations Analyst
Information System Secu-
rity Officer (ISSO)
Cyber Security Specialist
Cross Functional Security
Developer
Security Risk Manager
Systems Engineer -
Information Assurance Offi-
cer
Computer Security Systems
Specialist (Secret Clear-
ance)
Security Specialist - Infor-
mation Assurance and In-
formation Security Engi-
neering (Secret Clearance)
14. Cleared and Non-Cleared
Professionals
ICF International
530 Gaither Road
Rockville, MD 20850
www.icfi.com
ICF International (NASDAQ:ICFI) partners with govern-
ment and commercial clients to deliver professional ser-
vices and technology solutions in the energy, environ-
ment, and infrastructure; health, social programs, and
consumer/financial; and public safety and defense mar-
kets.
ICF International, a diverse and well-established firm with
5,000 staff worldwide working on stimulating and worth-
while projects in areas such as energy, health, and cyber
security. Our expert team of Cyber Security Specialists
has been internationally recognized for their abilities, win-
ning first place at both the 2011 MDC3 (formerly Maryland
Cyber Challenge) and National Cyberlympics, as well as
second place in the International Cyberlympics that same
year. We’re currently looking for support from cyber secu-
rity professionals in the Baltimore/Washington metro area
and believe that your experience and background falls
perfectly in line with what we are currently looking for. We
believe that together we can provide each other with a
great networking opportunity that will help to grow the al-
ready booming local Cyber Security industry.
Hiring
IT Cybersecurity Expert
(1500001182)
Quantum Network Security Re-
searcher (1400004965)
Network Security Analyst
(1500002894)
Computer Security Researcher
(1500001590)
CentOS Linux Hadoop Based
Cloud Engineer (1500002148)
Cyber Security Specialist C&A
(1500002193)
Vulnerability Scanning Special-
ist (1500002505)
Cybersecurity Researcher
(1500002568)
Security Engineering Lead
(1500002409)
Senior Malware Analyst
(1500003020)
IDS/IPS Engineer (1500003287)
Senior Incident Responder
(1500003289)
Cyber Security Specialist
(1500002658)
Network Engineer-Infrastructure
Support (1500002525)
Research Engineer
(1500002008)
Network Infrastructure IT Sup-
port – LINUX/UNIX experience
(1500001665)
Certification & Accreditation
Support Specialist Policy Vali-
dator (1500003299)
Information Assurance Expert
for a Remote Certification and
Accreditation Program
(1500001569)
Senior PHP Developer & Senior
Application Developer
(1500002198/1500002223/1500
002302/1500002868/15000021
98)
15. Cleared and Non-Cleared
Professionals
InfoReliance
4050 Legato Road
Fairfax, VA 22033
www.inforeliance.com
InfoReliance Corporation is a rapidly growing Information Technol-
ogy (IT) consulting firm that provides the core services and pro-
gram life cycle management support that federal agencies need to
improve service delivery, collaboration, and efficiency of business
operations. From the integration of large-scale information systems
to custom software applications and portal implementations, the
quality of InfoReliance’s enterprise solutions enables our clients to
improve data management, perform critical analysis, make confi-
dent decisions, and meet mission requirements. Known for deliver-
ing large-scale, highly complex software applications for defense
and civilian organizations, InfoReliance has helped dozens of
agencies automate lines of business and leverage their technology
investments by providing exceptional IT counsel, first-class prod-
ucts and services and on-time, on-budget implementations.
Founded in 2000, InfoReliance is a thriving, privately-held small
business that has repeatedly been named a “fastest growing com-
pany” by organizations such as Inc. Magazine, Washington Busi-
ness Journal and Washington Technology. And with revenues pro-
jected to be over $90 million, we’re recognized as a boutique firm
whose quality and level of service rival those of the largest govern-
ment IT vendors and integrators.
More than 30 defense and civilian clients have trusted InfoReliance
with their mission-critical, large-scale implementations – and it’s
easy to see why. Our expert engineers and consultants leverage
commercial best practices and high-level security clearances to de-
velop the applications that power the government’s most important
missions and mandates. From military manpower assignment sys-
tems to nationwide bio-defense surveillance applications, no objec-
tive or roll-out is too large. Our highly scalable solutions solve com-
plex government IT challenges while providing sustainable busi-
ness value.
Hiring
Principal Security Engineer
Red Team Assessment
Lead
Senior Security Engineer
eGRC / RSA Archer Engi-
neer
Configuration Manager /
ISSO
Technical Writer
McAfee Product SME / En-
gineer
16. Cleared and Non-Cleared
Professionals
JPMorgan Chase
7777 Girard Ave
La Jolla, CA 92037
Careers.jpmorgan.comcareers/divisions/technology
Leading the way through innovation
Members of our Technology team have the opportunity to
work in a fast-paced environment that values innovation
and collaboration, and to enjoy all the benefits that come
with working at a $90 billion global financial services firm
large on scale and impact.
Hiring
Jersey City, NJ
AIX/Cyber SysAdmin Global Services Ops
Application Dev - Cybersecurity
Application Security Lead - Cyber Vulner-
ability Hygiene / Vulnerability Management
Architect Lead - Cyber Security
Cyber Fraud Analytics Lead
Cyber Incident Mgmt Lead -- NA
Cyber Security - Sr. Forensic Analyst
Cyber Security Architect
Cybersecurity - Service Metrics Manager
Cybersecurity Content Developer
Global Head of Cybersecurity Technology
Senior Malware Analyst/Reverse Engineer
- Cyber Security
New York-New York
Application Security Lead - Cybersecurity
Awareness Analyst – Cybersecurity
Cyber Intelligence Analyst
Cyber Program & Strategy Director
Cyber Security Op Excellence Lead
Cyber Security Ops Center Manager
Cybersecurity Manager
Cybersecurity Program Strategy Lead
Digital Cyber Program Manager
Digital Cyber Project Analyst
Incident Response Lead Cybersecurity
Sourcing Group Mgr, CyberSec - IT Risk
Sourcing Mgr - Cyber Security & Risk
VP IT Auditor - Cyber Infrastructure Corpo-
rate & Investment Banking Technology
VP Global Cyber Security Audit - Forensics
& Investigations
VP Global Cyber Security Audit, Pen Test
Columbus, Ohio
Cyber Program Mgr - Corp Tech & Risk
Cyber Security Controls and Detection
Lead - Digital
Cyber Security Data Analytics Lead - Con-
nectivity Assurance
Cyber Security Incident Response Man-
agement Lead - Digital
Cyber Security Operations Analyst
Houston, Texas
Cyber ESX & Virtual Server Operations
Analyst - Global Services Operations
17. Cleared and Non-Cleared
Professionals
Leidos
11951 Freedom Drive
Reston, VA 20190
www.leidos.com/careers
Leidos is a science and technology solutions leader work-
ing to address some of the world’s toughest challenges in
national security, health, and engineering.
The Company’s 23,000 employees support vital missions
for our government and the commercial sector, develop
innovative solutions to drive better outcomes, and defend
our Nation’s digital and physical infrastructure from ‘new
world’ threats.
Leidos is headquartered in Reston, Va. and had approxi-
mately $6 billion in revenues for fiscal year 2013, on a pro
forma basis, following the spin-off of the company’s tech-
nical, engineering and enterprise IT business on Sept. 27,
2013.
Hiring
Cyber Security Cloud Archi-
tect
Cyberspace Network Archi-
tect
Cyberspace Policy Analyst
Cyber Security Analyst
Computer Network Defense
Analyst
Network Security Analyst
Cybersecurity Developer
Cyberspace Analyst
Cyber Security Operations
Specialist
Cyber Discovery Analyst
Defense Warning Analyst
Intrusion Detection Analyst
All Source Cyber Analyst
18. Security Clearance
Required
LG-TEK
6865 Deerpath Road
Elkridge, MD 21075
www.lg-tek.com
LG-TEK is a leading provider of technology, language,
training and security services within the Intelligence Com-
munity. Established in 1997 as a software company, LG-
TEK has since grown to include all facets of system/
software development and life cycle support, networking,
training, linguistic support, facility planning and physical
and personal security.
A woman/minority/veteran-owned business, LG-TEK has
proven itself as a leader by providing a consistent track
record of excellent performance, as well as by providing
high-quality services to business and government cus-
tomers.
LG-TEK strives to continuously expand and improve our
capabilities to best meet customer requirements.
Hiring
Senior Learning Facilitator
Program Manager
Manufacturing Supervisor
Configuration Manager
Information Systems Secu-
rity Engineer (ISSE)
Scheduler
System Engineer
Acquisition Professional
Data Management Special-
ist
Financial Analyst
Cryptologic Instructor
(Windows)
Cryptologic Instructor
(Unix)
Cryptologic Instructor
(Security)
Cryptologic Instructor
(Wireless & Mobile Tech-
nologies)
Training Developer
Graphic Artist
Test Proctors/Validation
Specialists
System Administrators
Event Technicians
System Technicians
19. Security Clearance
Required
Lockheed Martin
6801 Rockledge Drive
Bethesda, MD 20817
www.lockheedmartinjobs.com
Driven by innovation and integrity, Lockheed Martin employees
dream big and then turn those dreams into reality. Every day the
men and women of Lockheed Martin are reminded of the vital im-
portance of the work they do in support of our customers’ missions.
Lockheed Martin is a leading systems integrator and global security
company principally engaged in creating systems vital to the safety
and security of free nations. We design and manufacture platforms
such as aircraft, ships, satellites and land vehicles that support the
U.S. armed forces and allied nations. We also partner with the De-
partment of Homeland Security to assist in keeping Americans safe
from the adversaries of freedom. As the foremost Federal IT con-
tractor, Lockheed Martin manages and secures large databases
and other IT systems for a diverse set of government agencies. We
apply our cyber security technologies to keep government and
business computer networks operating freely. We also design the
next-generation of alternative energy solutions and developing sat-
ellites to bring space exploration down to earth.
Governments worldwide look to us as a partner in their efforts to
build the institutional mechanisms that promote stability, peace,
and economic development. We have 1,000 facilities in 500 cities
and 46 states across the U.S. and business locations in 75 coun-
tries and territories. With 126,000 employees worldwide, Lockheed
Martin generated sales of $45.8 billion in 2010. Lockheed Martin is
shaping the future of technology in defense, information technol-
ogy, aeronautics, space and electronic systems. We use smart
power – the effective use of all of the tools of government –
whether the objective is defense or delivering services to citizens.
You can explore engineering careers in any of Lockheed Martin’s
diverse lines of businesses and work on some of the most impor-
tant projects in the world!
Our Vision: Powered by Innovation, Guided by Integrity, We Help
Our Customers Achieve Their Most Challenging Goals.
Our Values: Do what’s right - Respect others - Perform with excel-
lence.
Hiring
Software Developers
Web Developers
Cloud Software Engineer
Linux Systems Administra-
tor
Embedded Software/
Hardware Engineer
RF Engineers
Systems Integration/Test
Engineer
Android/Mobile Develop-
ment
Engineers
Cyber Engineers (Red and
Blue Team)
20. Cleared and Non-Cleared
Professionals
ManTech International
12015 Lee Jackson Highway
Fairfax, VA 22033
www.mantech.com
ManTech was founded in 1968 to provide advanced tech-
nological services to the United States government. We
began with a single contract with the U.S. Navy to de-
velop war-gaming models for the submarine community.
Over the years, our government's technology needs have
increased dramatically in scope and sophistication, and
we have grown to meet that challenge.
For more than 46 years, we kept a careful eye on where
emerging technologies were taking the government, and
we developed the resources to master those technolo-
gies—by staying close to our customers and anticipating
their needs, hiring talented professionals to propel us into
the future, and acquiring companies with proven capabili-
ties.
Today, we are a multi-billion-dollar public company that
provides the innovation, adaptability, and critical thinking
our government needs for success in defense, intelli-
gence, law enforcement, science, administration, and
other fields—throughout the nation and in many countries
throughout the world. We are now applying the lessons
learned in the unforgiving arena of national security to
help the private sector protect networks and critical infor-
mation.
Hiring
Software Engineer
ISSE/ISSO
Test Engineer
System Administrator
Comsec Custodian
CNO Developer
Software Developer
Software Defined Network
Developer
RF Engineer
System Engineer
Signal Processing Engineer
21. Security Clearance
Required
Millennium
1401 S. Clark Street
Arlington, VA 22202
www.millgroupinc.com
Millennium Corporation is an 8(a) Small Disadvantaged
Business (SDB) and Service Disabled Veteran Owned
Small Business (SDVOSB). Established in 2004 with the
vision of offering world class, integrated business solu-
tions for all levels of government and commercial enter-
prises.
Millennium today has evolved into an effective and
proven provider of professional services and a key man-
agement solutions partner. Led by an executive team with
unparalleled expertise and over a century of combined
senior level DoD experience, Millennium leads the way in
program management, contracting, system engineering,
logistics, information technology, and lean six sigma train-
ing & consulting services.
Hiring
Alexandria, VA
Systems Engineer/Architect
Test Engineer
Systems Engineer
Fort Belvoir, VA
Project Analyst
Program Assistant
Program Management Ana-
lyst
Fort Benning, GA
Analyst
Picatinny, NJ
PM R&D
Huntsville, AL
Systems Security Engineer
McConnell AFB, KS
Systems Security Engineer
22. Cleared and Non-Cleared
Professionals
MITRE
7515 Colshire Drive
McLean, VA 22102
www.mitre.org
The MITRE Corporation is a not-for-profit organization
that operates research and development centers spon-
sored by the federal government. As a public interest
company, we work with industry and academia to enable
government and the private sector to make better deci-
sions and implement solutions to national and global
challenges.
Hiring
Lead/ Principle Security
Engineer
Security Architect
Cloud Security Engineer
Software Engineer
(SCADA)
Mobile Security Engineer
Mobile Software Engineer
Data Security Engineer
Big Data Analytics
Ops Research Modeling &
Simulation Engineer
Reverse Engineer
(Communication Devices)
Systems Integration Engi-
neer
Lead Cross Domain Solu-
tions Engineer
Cyber Security Data Fusion
Architect
Cyber Security (Network
Sensing) Engineer
Network Security Engineer
Video Analysis and Content
Extraction
Lead Data Modeler
Healthcare Security Engi-
neer
IdAM / PKI Security Engi-
neer
Communications Engineer
Health Policy Analyst
Contract & Acquisition Spe-
cialist
Healthcare Payment Re-
form Program Manager
Systems Engr (DODAF)
23. Cleared and Non-Cleared
Professionals
NSA
9800 Savage Road
Fort Meade, MD 20755
www.nsa.gov/careers/cyber
The National Security Agency has a complex mission: to gather for-
eign intelligence and to defend U.S. government information sys-
tems. Communications have evolved from the past. Today, the IT
infrastructure is digital from start to finish. America's national secu-
rity information depends on technology as never before.
That's why NSA employs a wide variety of cyber professionals: to
help protect and defend U.S. government IT systems, and to help
exploit the intelligence of adversaries.
As our use of technologies grows exponentially, so do our country's
vulnerabilities. Our national security depends on the stability and
reliability of our communications infrastructure. The cyber threat to
IT and national security systems has never been greater.
In fact, with the increased number of cyber events around the
world, it’s more important now than ever to stay a step ahead of our
cyber adversaries.
At NSA, knowing cyberspace matters. As a cyber professional, you
will become a part of a tradition of excellence, poised to lead the
nation in the protection of our country’s national interests in cyber-
space for years to come.
Cyber is a team sport. NSA seeks cyber professionals with the fol-
lowing backgrounds:
Computer Science
Computer Engineering
Electrical Engineering
Intelligence Analysis
Mathematics
Apply today for a position with NSA as a cyber professional, and
enjoy an exciting career within the dynamic, fast-paced world of cy-
berspace.
Hiring
Intell Analyst – Entry Level
Intel Analyst – Experienced
Exploitation Analyst
Language Analyst
Data Scientist
Computer Network Operator
Software Engineer
Software Developer
Cryptanalytic Computer Network
Operations Development Program
(C2DP) - 3 Year Program
The C2DP trains computer scien-
tists, mathematicians, engineers
and other related professionals.
Employ advanced computer sci-
ence, electrical engineering and
mathematical approaches to
solve challenging cryptanalytic
problems. U.S. Citizenship re-
quired.
Budget Analyst/Business Financial
Manager (Development Program) -
3 Year Program
The BFMDP trains recent college
graduates for a career as either a
Business Financial Manager,
Budget Analyst or Finance and
Accounting Specialist.
Contracting Officer Development
Program - 3 Year Program
The CODP serves as a training
ground for recent college gradu-
ates to prepare them for a career
as a Contracting Officer.
NSA Program Mgr Development
Program - 3 Year Program
The PMDP trains recent college
graduates to prepare them for ca-
reers as a Program Manager,
Software/Hardware Project Man-
ager or Engineering Leader.
25. Security Clearance
Required
Prime Solutions
6760 Alexander Bell Drive
Columbia, MD 21046
www.primeso.com
Founded in 2003, Prime Solutions LLC provides Key
People in Critical Places®. Prime Solutions excels in
Computer Network Operations (CNO). As experts in tools,
tactics, and techniques used in Cyber warfare, we pro-
vide a diverse service offering highlighted by:
System Vulnerability Analysis
CNO Software Development
Malware Analysis / Reverse Engineering
Network Engineering and Defense
Defensive Vulnerability Analysis
Enterprise Software through Agile Processes
Mission System Support
Prime Solutions recognizes and values the capabilities of
its employees. We place a high level of importance on
professional development and training to enable the next
generation of CNO experts.
Our corporate leadership has a deep and focused under-
standing of the complex technical problems associated
with the Cyber mission. This enables us to foster an envi-
ronment where mission and technology drive the busi-
ness.
Hiring
Software Engineer
Java Developer
Application Developer
Embedded Developer
System Engineer
Information Systems Secu-
rity Engineer
26. Cleared and Non-Cleared
Professionals
Riverside Research Institute
2640 Hibiscus Way
Beavercreek, OH 45431
www.rri-usa.org
Riverside Research Institute (RRI) is an independent, not-
for-profit research institute. We are committed to provid-
ing high quality, high level advisory support, applied sci-
ence, engineering and technical solutions for our clients.
RRI offers competitive compensation and excellent bene-
fits, including medical/ dental plan, pension and tuition re-
imbursement.
Riverside Research is an Equal Opportunity Employer.
US Residents Only. Must be eligible for security clear-
ance.
Hiring
Hanover, MD
Binary Analyst/Reverse En-
gineer I
Binary Analyst Reverse En-
gineer II
Software Assurance
Evaluation Engineer I
Software Assurance
Evaluation Engineer III
Binary Reverse Engineers
Champaign, IL
Information Syst/Networks
Security Specialist
Quantico, VA
Binary Reverse Engineers
Beavercreek, OH
Software Engineer- WPAFB
27. Cleared and Non-Cleared
Professionals
SAIC
1710 SAIC Drive
McLean, VA 22102
www.saic.com
SAIC's Core Values
Our core values define our culture and the way in which we con-
duct business. They form the basis of our conduct and govern our
decisions. At SAIC, how we behave is as important as the results
we achieve. An underlying principle of our conduct is our commit-
ment to uphold the highest ethical standards in ourselves and
those around us.
Integrity
Our culture of ingenuity is rooted in our passion for doing what is
right and delivering on our commitments. Integrity, respect and
trust have been an integral part of our company since day one and
are fundamental to our decisions and behaviors.
Mission Understanding
Our ingenuity starts with the understanding of our customers’ op-
portunities and challenges. Before we begin the process of design-
ing a solution, we use our deep customer knowledge to define
what’s needed to ensure mission success.
Empowerment
Redefining ingenuity depends on team entrepreneurialism and em-
powerment for the good of the enterprise. Ingenuity happens when
our people are encouraged to explore, leverage expertise and
knowledge from across the company, accept responsibility for out-
comes, and hold ourselves and others accountable for results.
Creativity
We’re redefining ingenuity through our collective creativity. We
build on the inventiveness and expertise of our exceptional people
and our partners to quickly get to smarter and more innovative so-
lutions.
Hiring
Ft. Meade MD - TS/SCI CI Poly
Cyber Policy Analyst
Cyber Operational Analyst
Cyber Capability Analyst
Cyber Space Capabilities Registry Analyst
Cyber Operations Engineer
Cyber Network Architect
Cyber Security Developer
Cyber Space Scientist
Cyber Security Engineer
Cyber Space Analyst
Cyber Security Network Engineer
Cyber Exercise Coordinator
Greenbelt - Secret
InfoSec Analysts II - GSFC Mission Security
DC - TS/SCI CI Poly
Cyber Standards Coord
Cyber Security Staff Officer
Norfolk/Lorton VA, Adelphi/Aberdeen MD- TS, TS/SCI
SDN Programmer
High Perf Computer Network Design Engineer
iDVRN Design Engineer
Dynamic Optical Network Design Engineer
High Performance Computer (HPC) Architect
Data Scientist for Hierach Multiscale Modeling
Big Data Engineer
Design Engr for Scalable Multi-tiered Arch
Web Visualilzation and Simulation Engineer
Network Data Modeling Format Engineer
Information Assurance Vulnerability Engineer
Cyber Security Engineer
Collaboration Software Developer
High Performance Computer Network Ops Engr
High Performance Computer Software Devs
DC - Secret eligible
Senior PKI Engineer- Risk Assessor
IA Business Process Consultant
Senior IA Analyst
Security Compliance & Tech Team Lead
Computer Forensics & Intrusion Analyst
Vienna VA - Public Trust eligible
Systems Engineer - IT Operations
Information Assurance Security Engineer
DC - Public Trust eligible
Systems Security Analyst
DC - Secret
Information Assurance Analyst
28. Cleared and Non-Cleared
Professionals
Steel Point Solutions
3540 Crain Highway
Bowie, MD 20716
www.steelpoint-llc.com
Leveraging practical processes, qualified professionals,
and intellectual property to deliver sound solutions with
secure results.
Steel Point Solutions is a Small Disadvantaged Business
(SDB) and a Woman Owned Small Business (WOSB).
Established in 2013 with a vision of offering world class,
integrated business solutions for all levels of Government
and commercial enterprises. We are represented by a
team of talented and qualified professionals who know
how essential efficient, cost-effective integrated solutions
are to your organizations success. Leveraging these re-
sources, we strive on a daily basis to lead the industry in
program management and service delivery.
Hiring
CDSS
Sr. / Senior Level Linux SA/
SE (solid senior-level Linux
experience required): poly
must be less than 2 years old
Software Engineer
INT CDSS
Jr. / Linux SA/SE (solid Linux
experience required) - poly
must be less than 2 years old
Test Engineer CDSS
Int. / Linux SA/SE (2) (solid
Linux experience required) –
poly must be less than 2
years old (Must have
REDHAT Cert)
Financial Analyst Acquisition
Professional I
System Engineer I- Software
experience needed
System Engineer II- Software
background needed to review
technical documentation. Sys-
tem Engineer II
System Engineer III
Applications Engineer III
(Java SWE)
Applications Engineer (AE) IV
Apps Engineer IV (Java SWE)
Subject Matter Expert 3
(Technical Editor and Writer)
Subject Matter Expert 3 (Web
Architect)
ITSC IV ITSC IV (Network En-
gineer) (2)
Deployment Tech 3 Senior
Software Engineer
29. Security Clearance
Required
TASC, an Engility Company
4801 Stonecroft Blvd
Chantilly, VA 20151
www.tasc.com
Our Vision
To be the first and best choice for our global customers, employees
and investors. We make and meet commitments. We perform with
integrity. We are a top-mission partner whenever and wherever our
customers need us.
Our Mission
To enable our customers to achieve theirs. We meet commitments
with total customer focus, applying experience, agility, discipline
and integrity to get the job done.
Our Values
Customer-Focused
We anticipate and meet the needs of our customers with our exper-
tise, efficiency and relentless focus on exceeding their expecta-
tions. "Your Mission. Our Commitment." It's not just our tagline; it's
also our guiding principle.
Differentiated
Engility stands above the competition because we foster a culture
of continuous improvement and a spirit of innovation in our efforts
to be the best government services company for our customers,
employees and investors.
Servant Leadership
Every position in the company contributes to our employees' suc-
cess. In turn, our employees ensure our customers' success.
Earned Trust
We earn our customers' trust by delivering excellent performance in
an ethical way. We earn our employees' trust by maintaining a cul-
ture based on an unwavering commitment to the highest ethical
standards and treating each other with respect. We earn our inves-
tors' trust by delivering consistent, dependable, industry-leading
financial results.
Hiring
Cyber IA Engineer (Mid) -
9234BR
30. Security Clearance
Required
Trace Systems
1600 Tysons Boulevard
McLean, VA 22102
www.tracesystems.com
Based in Tysons Corner, Virginia, Trace Systems provides a comprehensive range of
telecommunications, networking, cybersecurity and information technology services, inte-
grated systems, and solutions to the United States Government. Our capabilities span
the entire lifecycle of support, to include engineering and design, integration, testing, field-
ing, and training, as well as operations and maintenance.
We support our customers wherever and whenever they require our services and solu-
tions. Since our founding in 1999, Trace Systems has been addressing mission critical
requirements for the Department of Defense (DOD) in nearly every corner of the globe:
We live and work alongside many of our military customers in austere, hazardous,
and tactical ‘down-range’ contingency environments such as Iraq and Afghanistan,
and we understand and are extensively experienced in how to operate and support
our customers in these challenging environments. For example, we’ve been in Af-
ghanistan continuously since 2004 supporting a range of DOD and coalition custom-
ers.
We support many different DISA, Army, Marine, Navy, NATO and Joint coalition cus-
tomers globally in places such as Germany, Belgium, Bahrain, Afghanistan, Iraq,
Jordan, Kuwait, Korea and Egypt. We know how to navigate the complexities of living
and working in these OCONUS environments. From taxes and visas, to sponsorship,
housing, safety, licensing and life support, we are capable of supporting short-term
and long-term mission support to our customers that need support wherever they
deploy or operate.
We support combatant commands such as NORTHCOM, SOUTHCOM, CENTCOM
and PACOM with solutions and services that require rapid response to requirements
on a moment’s notice. We have a long history of supporting immediate reaction and
response teams as well as supporting short-notice deployments of highly-specialized
teams to address cyber security, networking, systems, command center and commu-
nications systems and services requirements.
We adopt our customer’s mission as our mission and work to ensure their success. We
listen to our customers and anticipate their needs, providing support in advance of their
next mission, whenever and wherever required:
We support our customers before they deploy, providing CONUS-based training and
support to them at their home garrisons, as well as during pre-deployment field exer-
cises such as CTE and CTX. Our pre-deployment training support helps prepare the
units for the technologies, architectures, systems, operating environment and tempo,
projects and other initiatives that they will be faced with when deployed.
We support customers such as the DISA Enhanced Mobile Satellite Solutions
(EMSS) Distributed Tactical Communications Systems (DTCS) and Army’s PEO-C3T
and PM WIN-T as they develop and deploy new capabilities and feature-sets to units.
This includes support that spans from lab testing to deployment for field testing and
certification, training and integration support globally.
When deployed customers transition their missions to incoming units during a RIP/
TOA, we provide the technical and functional continuity needed for mission success.
We work to facilitate the transition of the mission by meeting and working with incom-
ing units during their deployment workups. We understand how this partnership is
critical to the success of our customers.
Hiring
USCYBERCOM PM,
5939390
Cyberspace Analyst Level
II, 6197750
Cyberspace Operations En-
gineer III, 6197708
Cyberspace Analyst Level
III, 6197414
Cyberspace Joint Opera-
tions Planner, 6197363
31. Security Clearance
Required
Vencore
15052 Conference Center Drive
Chantilly, VA 20151
www.vencore.com
Mission Centered. Innovation Driven.
Inspired by combining the word core with Latin words de-
noting respect, the name Vencore emphasizes that our
high quality, high value services and solutions are at the
core of our customers’ missions.
Vencore has over 40 years of proven experience provid-
ing information solutions, engineering and analysis to the
U.S. Intelligence Community, Department of Defense and
Federal/Civilian Agencies. We support our customers’
missions by helping them solve their complex challenges
while maintaining the highest level of integrity and ac-
countability.
Our people design, develop and deliver critical solutions
as our customers’ trusted partner. Our innovations in cy-
ber security, data analysis and technology, combined with
our focus on research, ensure Vencore remains ahead of
the ever changing demands in the market.
Vencore and its Applied Communication Sciences sub-
sidiary employ 4,800 dedicated employees located
throughout the Nation with a presence in 17 states and in
select foreign countries. For more information on Ven-
core, please see our company overview data sheet.
Hiring
Top Secret/SCI Security
Clearance and Above
Solutions Architect Systems
Engineer
Software Engineer
Analysis and Modeling Sys-
tems Engineer
Systems Engineer
Research Scientist
IV&V Systems Engineer
Systems Integrator -- Cloud
Architect
Data Migration Engineer
Network Engineer
Systems Engineer Techni-
cal Specialist
Optical Engineer
Configuration Mgmt/Analyst
Financial Analyst
Sharepoint Developer
32. friend, fan or follow us on various
social networks & online communities!
Join our group on LinkedIn
LinkedIn.com/company/ClearedJobs.Net
Follow us on Google+
http://gplus.to/ClearedJobsDotNet
Connect with us on Twitter
@ClearedJobsNet
Like our Facebook page
www.facebook.com/ClearedJobFairs
Watch our YouTube channel
www.youtube.com/user/ClearedJobsDotNet
View presentations on SlideShare
www.slideshare.net/ClearedJobsNet
Download our Cleared
Job Seeker Guide