Job Type Full-time, Contract Description INFINISOURCE CONSULTING SOLUTIONS (ICS) InfiniSource Consulting Solutions (ICS), a 150+ employee government contractor specializing in Management Consulting,...
Caribou Thunder Building Tomorrow, Grounded in Legacy For the past 2 decades, Caribou Thunder has been a merit-based company driven by performance, innovation, and an unwavering commitment...
**Overview:** **Actalent** has an immediate internal opening for an **Executive Assistant** to two of our Vice Presidents at our **Global Headquarters** in **Hanover, MD** ! **Schedule:** + Internal |...
Acquisition Professional 3 Job Category: Consulting Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: Up to...
**JOB SUMMARY** The Sr. Incident Response Engineer will take on the lead cyber security incident responder role on the Baylor Scott & White Health cyber defense team. This role will be responsible for leading the incident response...
Computer Network Defense Analyst (CNDA) What you will be doing? In this role, the Computer Network Defense Analyst (CNDA) will be responsible for continuous network security monitoring, intrusion detection, and incident...
Director of Development, National Black Child Development Institute For over 50 years, the National Black Child Development Institute (NBCDI) has been at the forefront of engaging leaders, policymakers, practitioners, and parents around...
Become a part of our caring community and help us put health first The Risk Adjustment Compliance Director ensures compliance with governmental requirements. The Risk Adjustment Compliance Director requires an in-depth...
KET Job ID 24750027 KGS is seeking qualified candidates for our open positions, but we will only extend an offer of employment after a candidate applies through the link in our job posting. If you...
**Job Description** The Information Systems Security Engineer (ISSE) shall perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information...