Results, order, filter

Bluehawk LLC Careers 7 Jobs in United States

  • Information Systems Security Officer (ISSO) III

    Bluehawk LLC - Massachusetts
    ... Information Systems Security Manager (ISSO) III to ensure the appropriate operational security posture is ... to assigned duties. Execute the cyber security portion of the self-inspection, to include ...
  • Information Systems Security Officer (ISSO) II

    Bluehawk LLC - Colorado Springs, Colorado
    ... appropriate operational security posture is maintained for an information system and works in close ... to assigned duties Execute the cyber security portion of the self-inspection, to include ...
  • Information Systems Security Officer (ISSO) II

    Bluehawk LLC - Wright-Patterson AFB, Ohio
    ... ensure the appropriate operational security posture is maintained for an information system and works in ... Execute the cyber security portion of the self-inspection, to include provide security coordination and ...
  • Information Systems Security Officer (ISSO) II

    Bluehawk LLC - North Dakota
    ... ensure the appropriate operational security posture is maintained for an information system and works in ... Execute the cyber security portion of the self-inspection, to include provide security coordination and ...
  • Information Systems Security Officer (ISSO) II

    Bluehawk LLC - Oklahoma City, Oklahoma
    ... ensure the appropriate operational security posture is maintained for an information system and works in ... Execute the cyber security portion of the self-inspection, to include provide security coordination and ...
  • Information Technology/Information Assurance (IT/IA) Specialist

    Bluehawk LLC - District Of Columbia
    ... cyber security coordination on all Bodies of Evidence that make-up the authorization package ... intelligence, information technology, language, and training services to the U.S. Government and commercial ...
  • Security Operations Center (SOC) Analyst Lead

    Bluehawk LLC - Colorado
    ... . This position requires a solid understanding of cyber threats and information security in the domains ... technology security events to discern events that qualify as legitimate security incidents as opposed to non ...