Se ha denunciado esta presentación.
Utilizamos tu perfil de LinkedIn y tus datos de actividad para personalizar los anuncios y mostrarte publicidad más relevante. Puedes cambiar tus preferencias de publicidad en cualquier momento.

CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD

829 visualizaciones

Publicado el

If you've got a security clearance please pre-register here:
https://clearedjobs.net/job-fair/fair/87/
If you're not cleared, please pre-register here: https://cybersecjobs.com/job-fair/fair/73/

Publicado en: Reclutamiento y RR. HH.
  • Sé el primero en comentar

  • Sé el primero en recomendar esto

CyberMaryland Job Fair Job Seeker Handbook October 9, 2018, Baltimore, MD

  1. 1. CyberMaryland Job Fair Job Seeker Handbook #CyberJobFair Tuesday, October 9 Hyatt Inner Harbor Baltimore 11am - 3pm
  2. 2. Welcome to a Cyber Job Fair! LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US: Schedule 11AM - 3PM Resume Reviews These are quick 5 minute sessions where a job seeker can review their resume directly. We offer these sessions on a first-come, first-serve basis and they fill up fast. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card. Welcome to a Cyber Job Fair! LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US: Schedule 11AM - 3PM Resume Reviews These are quick 5 minute sessions where a job seeker can review their resume directly. We offer these sessions on a first-come, first-serve basis and they fill up fast. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card. Welcome to a Cyber Job Fair! LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US: Schedule 11AM - 3PM Resume Reviews These are quick 5 minute sessions where a job seeker can review their resume directly. We offer these sessions on a first-come, first-serve basis and they fill up fast. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card. Welcome to a Cyber Job Fair! LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US: Schedule 11AM - 3PM Resume Reviews These are quick 5 minute sessions where a job seeker can review their resume directly. We offer these sessions on a first-come, first-serve basis and they fill up fast. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card. BEST RECRUITER Best Recruiter Your vote counts! Your Job Seeker survey asks which company or companies provided you with the best recruiting experience today. We tally your votes and recognize the top companies as Best Recruiters. Cell Phone Charging Station Forgot to charge your cell phone? Just check in with our registration desk for charging. Recycle Name Badge Please recycle your name badge in the red bowl before leaving the Cleared Job Fair. Survey Complete your Job Seeker survey and leave in the red bowl to be entered to win a $100 gift card.
  3. 3. Hyatt Baltimore, Maryland Suites
  4. 4. 4 | Tuesday, October 9 | Baltimore, Maryland Bank of America www.bankofamerica.com H I R I N G  Analyst  Information Security Engineer  Online Third Party Assessor  Application Programmer/Developer (Hadoop)  Application Programmer/Developer (.NET)  System Engineer-Info Security Here to help connect you to what matters most At Bank of America, we are guided by a common purpose to help make financial lives better by connecting clients and communities to the resource they need to be successful. We deliver this through a focus on responsible growth and environmental, social and governance (ESG) leadership. We are driving growth – helping to create jobs, develop communities, foster economic mobility and address society’s biggest challenges – while managing risk and providing a return to our clients and our shareholders. Because we recognize that we can only be successful when the individuals, companies, communities and employees we serve are able to reach their vision of success.
  5. 5. 5 | Tuesday, October 9 | Baltimore, Maryland By Light Professional IT Services www.bylight.com | SECURITY CLEARANCE REQUIRED H I R I N G TS/SCI Clearance Required  Cyber Fusion Analyst  Cyber Intel Analyst  Cyber Countermeasures Analyst  Cyber Watch Officer By Light Professional IT Services LLC (By Light) is an ISO 9001:2008, 20000-1, and 27001 registered business that provides a full range of hardware and software engineering services to defense, civilian, and commercial customers worldwide. Driven by a management team that leverages real-world expertise from the defense, intelligence, federal healthcare, and commercial sectors, we provide reliable, efficient, and cost-effective IT solutions to each customer, every time. Founded in 2002 by industry professionals with extensive knowledge in the Department of Defense and experience in the civilian arenas, we have the unique advantage of meeting customer requirements by integrating best commercial practices with critical real-world expertise to design innovative solutions that bridge the gap between legacy and emerging technologies.
  6. 6. 6 | Tuesday, October 9 | Baltimore, Maryland Chesapeake IT Consulting chesapeake-it.com | SECURITY CLEARANCE REQUIRED H I R I N G TS/SCI Clearance Required  Cloud Analytics Developer  Cloud Hosting Engineer  Cyber Exploit Developer  Jr., Mid and Sr. Java Developer  Linux System Administrator  Linux System Engineer Chesapeake IT Consulting is an agile, national security technology small business offering information technology services, infrastructure design and administration services, and cyber security solutions to ensure your business is successful, sustainable, and secure. Offerings include 20 years of experience in:  Identity and authorization management services  Extensive Linux systems customization, hardening, and deployments to the enterprise cloud  Java development for enterprise web applications and middleware services  Enterprise administration, monitoring and load-balancing  Data science, data analytics and cloud based big data technologies
  7. 7. 7 | Tuesday, October 9 | Baltimore, Maryland Dawson dawson8a.com H I R I N G  Jr. Cyber Incident Handling/Response Support Analyst  Cyber Counterintelligence Analyst DAWSON is growing fast! We currently have 48 positions open across the United States. Kupono Ka Hana (Excellence in Service) Dawson is a Native Hawaiian Organization 8(a) small business with 23 years of experience providing innovative and cost effective solutions to our clients across the globe. As part of the DAWSON Ohana, you will be provided a best-in-class benefits program that strives to ensure our great people have peace of mind when it comes to health and wellness. We offer great benefits and features such as...  Competitive salary  Performance based bonus plans  Employee-paid health insurance  Monthly wellness stipend  Paid vacation and sick leave  Company-paid memberships to Costco or Sam’s Club  Flexible work environment  And much more The most highly skilled and specialized staff in the industry, proven and in-place management systems, and the ability to respond to our clients’ global needs help make DAWSON a responsible choice by our clients. With core competencies that span environmental, construction, logistics, and IT/Cyber Solutions, DAWSON possesses a unique capability to deliver integrated and innovative solutions to federal and commercial clients in the environmental, facilities, infrastructure, and emergency response industries. Through these integrated capabilities, DAWSON offers customers a more operationally efficient and cost effective native 8(a) solution to their complex problems. We are an equal employment opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, gender, national origin, disability status, protected veteran status or any other characteristic protected by law. VEVRAA FEDERAL CONTRACTOR
  8. 8. 8 | Tuesday, October 9 | Baltimore, Maryland FEDDATA www.feddata.com H I R I N G  Software Engineers  Cloud Engineers  Linguists  Intelligence Analysts  Data Forensics  ISSO/ISSE  Systems Engineers with Linux  Help Desk Specialists  Network Engineer  Hardware Technician  Ticket Coordinator  System Administrators  ISSE/ISSO  Test Engineer Federal Data Systems (FEDDATA) has provided information technology services to commercial and Government markets since 2004. We specialize in the design, implementation and monitoring of automated systems with a corporate emphasis on data security, incident response, continuity of operations, and information assurance. FEDDATA engineers work with our clients to keep their data secure using hardware and software solutions including storage area networks, secure backup sites, automated data replication hardware and software, and network and data monitoring tools. FEDDATA makes full use of new technologies including cloud computing, virtual computing and Internet based tools to provide the most secure, cost-effective solutions that are technologically feasible to protect our client’s data. The company’s customers are primarily Government Agencies, Bureaus and Commissions located in Northern Virginia and Maryland.
  9. 9. 9 | Tuesday, October 9 | Baltimore, Maryland FireEye www.fireeye.com H I R I N G  Cyber Security Analyst  Cyber Intel Analyst  Malware Analyst  Reverse Engineer  Penetration Tester  Cyber Threat Engineers  Incident Response Consultant  Remediation Consultant (IR)  Security Engineer  SOC Lead  SOC Analyst  CNO Software Developer Every day at FireEye, we see firsthand the impact of cyber-attacks on real people. This is what inspires us to fulfill our mission to relentlessly protect our customers from the impact and consequences of cyber attacks. We have learned that technology alone isn’t enough to combat cyber attackers. Our fundamental belief is that hands-on front-line expertise and intelligence, combined with innovative technology, provides the best means to protect our customers from cyber threats. FireEye has created a unique learning system. Our real-time knowledge of the threat landscape ensures that our offerings provide the best means to protect our customers. We are constantly guided by our frontline expertise as we build our products, deliver threat intelligence and arm our services team to prepare for, respond to and prevent breaches. The FireEye Innovation Cycle was created by product teams embracing our world- class frontline threat expertise AND our frontline experts embracing our solutions. We use this innovation cycle to create the most effective cyber defense platform – a seamless, on demand extension of our customers security operations. That is our commitment, that is our difference.
  10. 10. 10 | Tuesday, October 9 | Baltimore, Maryland ICF www.icf.com | SECURITY CLEARANCE REQUIRED H I R I N G  Software Engineer Python/NodeJS/Android  Cybersecurity Network Architect  Security Control Assessor – Validator  Software System Engineer – Python  Assessment and Authorization Support Specialist-Remote Assessment  Big Data Architect/Systems Engineer  Cybersecurity Lab Manager  Devops Cloud Analytic Platform Engineer  Cloud Analytic Platform Engineer  Threat Hazard Identification and Risk Assessment Lead  Cloud Engineer  Cyber Security Service Provider Current Operations Lead  Jr Behavioral Scientist  Junior Behavioral Scientist Researcher  Senior Software Engineer  Software Engineer  Software Developer  Junior Web Developer  Vulnerability Scanning Specialist  Web Developer  Senior Web Developer Working at ICF means applying a passion for meaningful work with intellectual rigor to help solve the leading issues of our day. Smart, compassionate, innovative, committed, ICF employees tackle unprecedented challenges to benefit people, businesses, and governments around the globe. We believe in collaboration, mutual respect, open communication, and opportunity for growth. ICF is named to Forbes’ Best Places to Work list. If you’re seeking to make a difference in the world, visit www.icf.com/careers to find your next career.
  11. 11. 11 | Tuesday, October 9 | Baltimore, Maryland Jacobs www.jacobstechnology.com H I R I N G  Application Security Assessor/Penetration Tester  Cyber Analyst- Tier I  Cybersecurity Consultant - Senior  Red Team Operator - Mid & Senior  SCA Engineer - Senior  Security Engineering Technical Manager  Security Scripting Engineer  SOC Analyst - Tier II & Senior  Splunk Architect  Splunk Content Developer  Splunk Engineer  Threat Intelligence Analyst  Vulnerability Management Engineer Secret Clearance Required  Information Security Analyst TS/SCI w/Polygraph Required  Cybersecurity Threat Analyst - Senior  Lifecycle Manager - Senior  Systems Engineer - Mid & Senior  Technical Writer People Are Our Greatest Asset As a professional services company, our talented employees are the key to developing and sustaining relationships: they invest time with our clients, understand their businesses, retain that accumulated client knowledge and pass it forward, and ultimately, our people deliver the work that adds value to our clients’ businesses. We are committed to providing our employees with an inclusive environment and meaningful work through which they can make lasting contributions as they develop and grow their careers with us. We Are Relationship Based This core value is our client-focused value. It describes our objective to create and maintain ongoing business relationships with our clients. We deliver superior and measurable value that exceeds what our clients can find elsewhere. We serve as their advocates and support them in their global aspirations. In simplest terms, our “relationship” value establishes an expectation of service, trust, and business partnership. Growth Is An Imperative We are a for-profit business. We make a commitment to our shareholders to perpetually grow our net earnings by an average of 15 percent every year, giving them a dependable return on their investment. The value of our company improves as we grow, creating benefits for all our stakeholders: investors, clients, employees, and those in the geographies where we operate.
  12. 12. 12 | Tuesday, October 9 | Baltimore, Maryland Leidos www.leidos.com/careers H I R I N G  CND Analyst  Cyber Analyst Support Specialist  Cyber CI Analyst  Cyber Intelligence Analyst  Cyber Intelligence Watch Officer  Cyber Lab Manager  Cyber Security Analyst  Cyber Security Engineer  Cyber Security Engineer – Firewall  Help Desk Specialist  Information Systems Security Officer  Malware Specialist  Network Engineer  Network Threat Forensics Support Specialist  SIGDEV Analyst  Systems Administrator  Systems Engineer  Technical and Cyber Threats Analyst VISION To be a recognized global leader in solving important problems in National Security, Engineering and Health. Through the inspired work of our diverse employees, we will deliver innovative, scalable solutions for our customers. We will do this with sustainability in mind, while also caring for our employees and the communities in which we operate. MISSION Through our culture of innovation, we will develop deep customer trust and create enduring solutions that improve our world. VALUES INSPIRED to make a difference We are committed to solving the world’s toughest problems. We achieve this by connecting our employees’ knowledge and our superior technologies across Leidos in pursuit of answers. We know that by embracing the differences of all employees we will unlock the creativity and innovation that makes a difference. PASSIONATE about customer success We are determined to understand and respond to our customers’ needs as if they were our own. This plus our dedication to deliver superior results ensures that we will create solutions that lead our markets. UNITED as a team We are bound together by our conviction that ethics and integrity are core to how we operate. We engage with others from a basis of trust because we believe that everyone is doing his or her best and wants to do the right thing. Therefore, we collaborate and share to create value for our employees, our shareholders and our communities. INTEGRITY is the foundation for all that we do At Leidos we have a steadfast commitment to integrity and ethical behavior in all that we do. This includes interactions with employees, customers and our communities.
  13. 13. 13 | Tuesday, October 9 | Baltimore, Maryland Mission Essential www.missionessential.com | SECURITY CLEARANCE REQUIRED H I R I N G  Geolocation Operator  Target Analyst Reporter  Target Digital Network Analyst  C3 Systems Analyst  EW Analyst  Systems Analyst  ELINT Watch Stander  SIGINT Analyst  DCGS Analyst  VOIP Engineer  Enterprise Tools Engineer  Configuration Management Engineer  Maritime Imagery Analyst  Test Engineer  Mission Assurance Analyst  Remote Tier II Support  Remote Monitor  Queue Coordinator h  Quality Assurance Technical Editor  Network Technician 1  Network Technician  Network Engineer  IT Technician Tier 2  IT Technician 1  Desktop Support Tech  CDRL Management Analyst  Infrastructure Analyst  Tier 2 Network Technician UNIQUE MISSIONS. BEST-IN-CLASS EXECUTION. Mission Essential Personnel, LLC is a veteran owned and operated partner to the Intelligence, Defense, and Law Enforcement communities. We have deployed thousands of analysts, operators, linguists and other specialists worldwide to support and serve alongside the U.S. Warfighter in some of the most austere and remote locations around the world. Mission Essential is your trusted source for comprehensive multi-disciplined Intelligence operations, Language and Socio- Cultural services, ISR, and Cyber. We deliver tailored solutions in Intelligence Analysis and Operations to U.S. Intelligence, Defense, and Law Enforcement customers around the world. We provide All-Source, SIGINT, CI/HUMINT, GEOINT, and OSINT professionals who enable mission success at the tactical, operational, and strategic levels. WHO WE ARE: Peerless talent using the most advanced technology to deliver mission essential, innovative solutions. WHO WE SERVE: Defense, diplomatic, intelligence community, and law enforcement customers, as well as multinationals and friendly foreign governments. HOW WE DO IT: Leverage top talent and a constellation of extraordinary partners. Low overhead, a flat organizational structure, a collaborative culture of crisp, real- time decision making and action to deliver the plan. Demonstrate unrivaled agility and efficiency by overcoming the obstacles that encumber large complex organizations. Provide clarity, certainty, urgency, and efficiency. EXPERIENCE: For over a decade, we have served customers at the strategic and tactical levels, providing operational solutions to the U.S. Departments of Defense, State, and Homeland Security; the Intelligence Community; friendly foreign governments; and multinational corporations.
  14. 14. 14 | Tuesday, October 9 | Baltimore, Maryland National Security Agency www.nsa.gov H I R I N G Cyber  Computer Network Analyst  Cyber Network Professional (Offensive/Defensive Operations)  Data Center Network Server Virtualization Engineer  Cyber Operations Exploitation Manager  Network Professional (Network Engineer/Network Architect) Computer Science  Computer Systems Architect  Computer Systems Researcher  Cryptanalytic Computer Scientist  Cyber Security Developer  Data Scientist  Digital Network Exploitation Analyst  Software Engineer  Software/Hardware Project Manager  Cyber Mitigations Engineer/System Vulnerability Analyst  Information System Security Professional Student Programs  Computer Science Intern Program (CSIP)  Cyber Summer Program  Summer Program for Operations Research Technology The National Security Agency/Central Security Service (NSA/CSS) is home to America's codemakers and codebreakers. The National Security Agency has provided timely information to U.S. decision makers and military leaders for more than half a century. The Central Security Service was established in 1972 to promote a full partnership between NSA and the cryptologic elements of the armed forces. NSA/CSS is unique among the U.S. defense agencies because of our government-wide responsibilities. NSA/CSS provides products and services to the Department of Defense, the Intelligence Community, government agencies, industry partners, and select allies and coalition partners. In addition, we deliver critical strategic and tactical information to war planners and war fighters. By its very nature, what NSA/CSS does as a key member of the Intelligence Community requires a high degree of confidentiality. Our Information Assurance mission confronts the formidable challenge of preventing foreign adversaries from gaining access to sensitive or classified national security information. Our Signals Intelligence mission collects, processes, and disseminates intelligence information from foreign signals for intelligence and counterintelligence purposes and to support military operations. This Agency also enables Network Warfare operations to defeat terrorists and their organizations at home and abroad, consistent with U.S. laws and the protection of privacy and civil liberties. NSA/CSS exists to protect the Nation. Our customers know they can count on us to provide what they need, when they need it, wherever they need it.
  15. 15. 15 | Tuesday, October 9 | Baltimore, Maryland Parsons parsonscyber.com | SECURITY CLEARANCE REQUIRED H I R I N G  Cloud DevOps Engineer  Enterprise Systems Engineer  DoD Systems Architect  Senior Network Engineer (Firewall)  DevOps Sensor Integrator  Software Reverse Engineer  Systems Engineer  C# Software Developer  Cyber Security / Test Engineer Parsons is leading the way in the field of cyber security. For over 30 years, Parsons has delivered cyber and converged security services to protect our nation’s most sensitive information and critical infrastructure. Be part of a team that will propel your career forward as you solve some of the toughest cybersecurity challenges facing our US government and worldwide industrial customers today. We’re looking for the kind of people who see this opportunity and don’t hesitate to act. Parsons is a leader in the world of Technical Services. We hire people with a broad set of technical skills who have proven experience taking on some of the greatest challenges. Parsons makes the world a safer place.
  16. 16. 16 | Tuesday, October 9 | Baltimore, Maryland Perspecta www.perspecta.com | SECURITY CLEARANCE REQUIRED H I R I N G  Systems Engineers  ISSO  ISSE  Systems Administrator  Joint Operational Planner  Cyberspace Analyst  Software Engineer  Process Engineer  Web Developer  Cyber Security Engineer  Knowledge Management Analyst  Technical Writer Every day at Perspecta, we enable hundreds of thousands of people to take on our nation’s most important work. We’re a company founded on a diverse set of capabilities and skills, bound together by a single promise: we never stop solving our nation’s most complex challenges. Our team of engineers, analysts, developers, investigators, integrators and architects work tirelessly to create innovative solutions. We continually push ourselves—to respond, to adapt, to go further. To look ahead to the changing landscape and develop new and innovative ways to serve our customers. Perspecta works with U.S. government customers in defense, intelligence, civilian, health care, and state and local markets. Our high-caliber employees are rewarded in many ways—not only through competitive salaries and benefits packages, but the opportunity to create a meaningful impact in jobs and on projects that matter. Perspecta’s talented and robust workforce—14,000 strong—stands ready to welcome you to the team. Let’s make an impact together.
  17. 17. 17 | Tuesday, October 9 | Baltimore, Maryland Raytheon jobs.raytheon.com | SECURITY CLEARANCE REQUIRED H I R I N G  Senior Vulnerability Researcher  Malware Analyst/ Reverse Engineer  CNO Developer Raytheon Company is a technology and innovation leader specializing in defense, civil government and cybersecurity solutions. Founded in 1922, Raytheon provides state-of-the-art electronics, mission systems integration, capabilities in C5I (command, control, communications, computing, cyber and intelligence), sensing, effects and mission support services. Raytheon is headquartered in Waltham, Massachusetts.
  18. 18. 18 | Tuesday, October 9 | Baltimore, Maryland SAIC www.saic.com H I R I N G Fort Meade MD – TS/SCI or Higher  Cyberspace Analyst  Cyber Operations Engineer  Cybersecurity Engineer  Cyber Operations Planner  Cyber Network Defense/Incident Response Analyst  Virtualization Engineer * All positions in Maryland require an active security clearance. ** Some positions in Virginia do not require a clearance to start but the applicant must be clearable. Make a Difference with SAIC As you consider a career at SAIC, you will find countless opportunities to contribute to solutions that are changing the world in real and measurable ways in our technical, engineering, intelligence, and enterprise IT business areas. Innovative Applications of Technology and Expertise We design, develop, and sustain offerings that empower diplomatic missions, support warfighter requirements, and advance exploration from the ocean floor to outer space. We maintain leadership positions in supply chain management, hardware integration, and global network integration. Our diversified contract base enables us to provide end-to-end capabilities and solutions across mission and enterprise lifecycles. We do all this with the constant and deliberate commitment to ethical performance and integrity that has marked SAIC since its founding. Supporting Programs of National Importance SAIC has a strong commitment to supporting programs of national importance—helping to solve or undertake our country’s most significant problems. We offer a broad range of services and solutions to address our customers' most complex and critical technology- related needs. SAIC's Core Values Our core values define our culture and the way in which we conduct business. They form the basis of our conduct and govern our decisions. At SAIC, how we behave is as important as the results we achieve. An underlying principle of our conduct is our commitment to uphold the highest ethical standards in ourselves and those around us.  Integrity Our culture of ingenuity is rooted in our passion for doing what is right and delivering on our commitments. Integrity, respect and trust have been an integral part of our company since day one and are fundamental to our decisions and behaviors.  Mission Understanding Our ingenuity starts with the understanding of our customers’ opportunities and challenges. Before we begin the process of designing a solution, we use our deep customer knowledge to define what’s needed to ensure mission success.  Empowerment Redefining ingenuity depends on team entrepreneurialism and empowerment for the good of the enterprise. Ingenuity happens when our people are encouraged to explore, leverage expertise and knowledge from across the company, accept responsibility for outcomes, and hold ourselves and others accountable for results.  Creativity We’re redefining ingenuity through our collective creativity. We build on the inventiveness and expertise of our exceptional people and our partners to quickly get to smarter and more innovative solutions.
  19. 19. 19 | Tuesday, October 9 | Baltimore, Maryland SURVICE Engineering www.survice.com H I R I N G APG MD  Cybersecurity Research & Development Engineer  Cybersecurity Analyst  Cybersecurity Engineer/Analyst  Cybersecurity Analyst Huntsville AL  Cybersecurity Engineer Fort Belvoir VA  Cybersecurity Engineer/Analyst Washington DC  Cybersecurity Analyst Springfield VA  Software Engineer  Database Administrator  Software Tester/Tech Writer Today, with nearly 400 employees and numerous locations across the country, the SURVICE Engineering Company continues to provide these unparalleled services, particularly in the areas of combat system safety, survivability, and effectiveness. In addition, we have continued to grow to match the needs of our customers, expanding and enhancing our capabilities to support the DoD community, as well as the homeland security, advanced technologies, environmental, and commercial markets. But we have also worked hard to retain the original vision upon which SURVICE was founded—to provide the warfighter with the safest, most survivable, and most effective equipment possible.
  20. 20. 20 | Tuesday, October 9 | Baltimore, Maryland U.S. Cyber Command www.uscybercom.mil H I R I N G  Capability Analyst  Lab Manager  Experimentation Lead  Test & Evaluation Specialist  Executive Communications  Systems Engineer  Operations Planning Specialist  Plans & Policy Officer  OPSEC Manager  Deputy Inspector General  Security Officer  Guard/Reserve Advisor  Privacy Act Specialist  Future Ops Planner  Information Technology Specialist  Logistics  Safety Manager  Human Capital / Human Resource Strategist  Cyber Trainer & Instructional Analyst  Cyber Exercise Planner  Cyber Scenario Developer  Cyber Doctrine Analyst  Cyber Modeling & Simulation  Cyber Workforce Development Analyst  Cyber Program Analyst  Budget Analyst  Ops Research Analyst USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities to: direct the operations and defense of specified Department of Defense information networks and; prepare to, and when directed, conduct full spectrum military cyberspace operations in order to enable actions in all domains, ensure US/Allied freedom of action in cyberspace and deny the same to our adversaries. The Command has three main focus areas: Defending the DoDIN, providing support to combatant commanders for execution of their missions around the world, and strengthening our nation's ability to withstand and respond to cyber attack. The Command unifies the direction of cyberspace operations, strengthens DoD cyberspace capabilities, and integrates and bolsters DoD's cyber expertise. USCYBERCOM improves DoD's capabilities to operate resilient, reliable information and communication networks, counter cyberspace threats, and assure access to cyberspace. USCYBERCOM is designing the cyber force structure, training requirements and certification standards that will enable the Services to build the cyber force required to execute our assigned missions. The command also works closely with interagency and international partners in executing these critical missions. Learn more about USCYBERCOM here: https://www.cybercom.mil/ Open Positions: The DoD Cyber Expected Service (CES) is an enterprise-wide approach for managing civilian cyber professionals across the Department. The CES is aligned to both Title 10 and Title 5 provisions in that it offers flexibilities for the recruitment, retention, and development of cyber professionals across Department. Under CES, USCYBERCOM now brings on new hires under the excepted service (GG grades) instead of the competitive service (GS grade). Experience is highly valued in the CES, which transcends the typical time-based approach in the competitive service. Promotions in the CES are qualification-based with no time-grade requirements required for advancement. Interested candidates can send inquiries and resumes to our recruiting inbox: cyber_recruiting@cybercom.mil
  21. 21. 21 | Tuesday, October 9 | Baltimore, Maryland U.S. Secret Service www.secretservice.gov H I R I N G  Law Enforcement Special Agents (Investigators)  Uniformed Division Officers  Information Technology Specialist (DC-Data Science and BI- Business Intelligence) The United States Secret Service is a federal law enforcement agency with headquarters in Washington, D.C., and more than 150 offices throughout the United States and abroad. The Secret Service was established in 1865, solely to suppress the counterfeiting of U.S. currency. Today, the agency is mandated by Congress to carry out dual missions: protection of national and visiting foreign leaders, and criminal investigations.
  22. 22. CyberSecJobs.com | ClearedJobs.Net

×