If you've got a security clearance please pre-register here:
https://clearedjobs.net/job-fair/fair/87/
If you're not cleared, please pre-register here: https://cybersecjobs.com/job-fair/fair/73/
2. Welcome to a
Cyber Job Fair!
LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US:
Schedule
11AM - 3PM
Resume Reviews
These are quick 5 minute sessions where
a job seeker can review their resume
directly. We offer these sessions on a
first-come, first-serve basis and they fill
up fast.
Cell Phone Charging Station
Forgot to charge your cell phone?
Just check in with our registration
desk for charging.
Recycle Name Badge
Please recycle your name badge
in the red bowl before leaving the
Cleared Job Fair.
Survey
Complete your Job Seeker survey
and leave in the red bowl to be
entered to win a $100 gift card.
Welcome to a
Cyber Job Fair!
LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US:
Schedule
11AM - 3PM
Resume Reviews
These are quick 5 minute sessions where
a job seeker can review their resume
directly. We offer these sessions on a
first-come, first-serve basis and they fill
up fast.
Cell Phone Charging Station
Forgot to charge your cell phone?
Just check in with our registration
desk for charging.
Recycle Name Badge
Please recycle your name badge
in the red bowl before leaving the
Cleared Job Fair.
Survey
Complete your Job Seeker survey
and leave in the red bowl to be
entered to win a $100 gift card.
Welcome to a
Cyber Job Fair!
LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US:
Schedule
11AM - 3PM
Resume Reviews
These are quick 5 minute sessions where
a job seeker can review their resume
directly. We offer these sessions on a
first-come, first-serve basis and they fill
up fast.
Cell Phone Charging Station
Forgot to charge your cell phone?
Just check in with our registration
desk for charging.
Recycle Name Badge
Please recycle your name badge
in the red bowl before leaving the
Cleared Job Fair.
Survey
Complete your Job Seeker survey
and leave in the red bowl to be
entered to win a $100 gift card.
Welcome to a
Cyber Job Fair!
LOGISTICS TO HELP YOU PLAN YOUR DAY WITH US:
Schedule
11AM - 3PM
Resume Reviews
These are quick 5 minute sessions where
a job seeker can review their resume
directly. We offer these sessions on a
first-come, first-serve basis and they fill
up fast.
Cell Phone Charging Station
Forgot to charge your cell phone?
Just check in with our registration
desk for charging.
Recycle Name Badge
Please recycle your name badge
in the red bowl before leaving the
Cleared Job Fair.
Survey
Complete your Job Seeker survey
and leave in the red bowl to be
entered to win a $100 gift card.
BEST
RECRUITER
Best Recruiter
Your vote counts! Your Job Seeker survey asks
which company or companies provided you with the
best recruiting experience today. We tally your votes
and recognize the top companies as Best Recruiters.
Cell Phone Charging Station
Forgot to charge your cell phone? Just check in
with our registration desk for charging.
Recycle Name Badge
Please recycle your name badge in the red bowl
before leaving the Cleared Job Fair.
Survey
Complete your Job Seeker survey and leave in the
red bowl to be entered to win a $100 gift card.
4. 4 | Tuesday, October 9 | Baltimore, Maryland
Bank of America
www.bankofamerica.com
H I R I N G
Analyst
Information Security
Engineer
Online Third Party
Assessor
Application
Programmer/Developer
(Hadoop)
Application
Programmer/Developer
(.NET)
System Engineer-Info
Security
Here to help connect you to what matters most
At Bank of America, we are guided by a common purpose to help make financial
lives better by connecting clients and communities to the resource they need to be
successful. We deliver this through a focus on responsible growth and
environmental, social and governance (ESG) leadership.
We are driving growth – helping to create jobs, develop communities, foster
economic mobility and address society’s biggest challenges – while managing risk
and providing a return to our clients and our shareholders. Because we recognize
that we can only be successful when the individuals, companies, communities and
employees we serve are able to reach their vision of success.
5. 5 | Tuesday, October 9 | Baltimore, Maryland
By Light Professional IT Services
www.bylight.com | SECURITY CLEARANCE REQUIRED
H I R I N G
TS/SCI Clearance
Required
Cyber Fusion Analyst
Cyber Intel Analyst
Cyber Countermeasures
Analyst
Cyber Watch Officer
By Light Professional IT Services LLC (By Light) is an ISO 9001:2008, 20000-1, and
27001 registered business that provides a full range of hardware and software
engineering services to defense, civilian, and commercial customers worldwide.
Driven by a management team that leverages real-world expertise from the defense,
intelligence, federal healthcare, and commercial sectors, we provide reliable,
efficient, and cost-effective IT solutions to each customer, every time.
Founded in 2002 by industry professionals with extensive knowledge in the
Department of Defense and experience in the civilian arenas, we have the unique
advantage of meeting customer requirements by integrating best commercial
practices with critical real-world expertise to design innovative solutions that bridge
the gap between legacy and emerging technologies.
6. 6 | Tuesday, October 9 | Baltimore, Maryland
Chesapeake IT Consulting
chesapeake-it.com | SECURITY CLEARANCE REQUIRED
H I R I N G
TS/SCI Clearance
Required
Cloud Analytics
Developer
Cloud Hosting Engineer
Cyber Exploit Developer
Jr., Mid and Sr. Java
Developer
Linux System
Administrator
Linux System Engineer
Chesapeake IT Consulting is an agile, national security technology small business
offering information technology services, infrastructure design and administration
services, and cyber security solutions to ensure your business is successful,
sustainable, and secure.
Offerings include 20 years of experience in:
Identity and authorization management services
Extensive Linux systems customization, hardening, and deployments to the
enterprise cloud
Java development for enterprise web applications and middleware services
Enterprise administration, monitoring and load-balancing
Data science, data analytics and cloud based big data technologies
7. 7 | Tuesday, October 9 | Baltimore, Maryland
Dawson
dawson8a.com
H I R I N G
Jr. Cyber Incident
Handling/Response
Support Analyst
Cyber
Counterintelligence
Analyst
DAWSON is growing fast!
We currently have 48
positions open across the
United States.
Kupono Ka Hana (Excellence in Service)
Dawson is a Native Hawaiian Organization 8(a) small business with 23 years of
experience providing innovative and cost effective solutions to our clients across the
globe. As part of the DAWSON Ohana, you will be provided a best-in-class benefits
program that strives to ensure our great people have peace of mind when it comes to
health and wellness. We offer great benefits and features such as...
Competitive salary
Performance based bonus plans
Employee-paid health insurance
Monthly wellness stipend
Paid vacation and sick leave
Company-paid memberships to Costco or Sam’s Club
Flexible work environment
And much more
The most highly skilled and specialized staff in the industry, proven and in-place
management systems, and the ability to respond to our clients’ global needs help
make DAWSON a responsible choice by our clients.
With core competencies that span environmental, construction, logistics, and
IT/Cyber Solutions, DAWSON possesses a unique capability to deliver integrated
and innovative solutions to federal and commercial clients in the environmental,
facilities, infrastructure, and emergency response industries. Through these
integrated capabilities, DAWSON offers customers a more operationally efficient and
cost effective native 8(a) solution to their complex problems.
We are an equal employment opportunity employer. All qualified applicants will
receive consideration for employment without regard to race, color, religion, gender,
national origin, disability status, protected veteran status or any other characteristic
protected by law. VEVRAA FEDERAL CONTRACTOR
8. 8 | Tuesday, October 9 | Baltimore, Maryland
FEDDATA
www.feddata.com
H I R I N G
Software Engineers
Cloud Engineers
Linguists
Intelligence Analysts
Data Forensics
ISSO/ISSE
Systems Engineers with
Linux
Help Desk Specialists
Network Engineer
Hardware Technician
Ticket Coordinator
System Administrators
ISSE/ISSO
Test Engineer
Federal Data Systems (FEDDATA) has provided information technology services to
commercial and Government markets since 2004. We specialize in the design,
implementation and monitoring of automated systems with a corporate emphasis on
data security, incident response, continuity of operations, and information assurance.
FEDDATA engineers work with our clients to keep their data secure using hardware
and software solutions including storage area networks, secure backup sites,
automated data replication hardware and software, and network and data monitoring
tools. FEDDATA makes full use of new technologies including cloud computing,
virtual computing and Internet based tools to provide the most secure, cost-effective
solutions that are technologically feasible to protect our client’s data. The company’s
customers are primarily Government Agencies, Bureaus and Commissions located in
Northern Virginia and Maryland.
9. 9 | Tuesday, October 9 | Baltimore, Maryland
FireEye
www.fireeye.com
H I R I N G
Cyber Security Analyst
Cyber Intel Analyst
Malware Analyst
Reverse Engineer
Penetration Tester
Cyber Threat Engineers
Incident Response
Consultant
Remediation Consultant
(IR)
Security Engineer
SOC Lead
SOC Analyst
CNO Software
Developer
Every day at FireEye, we see firsthand the impact of cyber-attacks on real people.
This is what inspires us to fulfill our mission to relentlessly protect our customers
from the impact and consequences of cyber attacks.
We have learned that technology alone isn’t enough to combat cyber attackers. Our
fundamental belief is that hands-on front-line expertise and intelligence, combined
with innovative technology, provides the best means to protect our customers from
cyber threats.
FireEye has created a unique learning system. Our real-time knowledge of the threat
landscape ensures that our offerings provide the best means to protect our
customers. We are constantly guided by our frontline expertise as we build our
products, deliver threat intelligence and arm our services team to prepare for,
respond to and prevent breaches.
The FireEye Innovation Cycle was created by product teams embracing our world-
class frontline threat expertise AND our frontline experts embracing our solutions.
We use this innovation cycle to create the most effective cyber defense platform – a
seamless, on demand extension of our customers security operations.
That is our commitment, that is our difference.
10. 10 | Tuesday, October 9 | Baltimore, Maryland
ICF
www.icf.com | SECURITY CLEARANCE REQUIRED
H I R I N G
Software Engineer
Python/NodeJS/Android
Cybersecurity Network
Architect
Security Control
Assessor – Validator
Software System
Engineer – Python
Assessment and
Authorization Support
Specialist-Remote
Assessment
Big Data
Architect/Systems
Engineer
Cybersecurity Lab
Manager
Devops Cloud Analytic
Platform Engineer
Cloud Analytic Platform
Engineer
Threat Hazard
Identification and Risk
Assessment Lead
Cloud Engineer
Cyber Security Service
Provider Current
Operations Lead
Jr Behavioral Scientist
Junior Behavioral
Scientist Researcher
Senior Software
Engineer
Software Engineer
Software Developer
Junior Web Developer
Vulnerability Scanning
Specialist
Web Developer
Senior Web Developer
Working at ICF means applying a passion for meaningful work with intellectual rigor
to help solve the leading issues of our day. Smart, compassionate, innovative,
committed, ICF employees tackle unprecedented challenges to benefit people,
businesses, and governments around the globe. We believe in collaboration, mutual
respect, open communication, and opportunity for growth.
ICF is named to Forbes’ Best Places to Work list. If you’re seeking to make a
difference in the world, visit www.icf.com/careers to find your next career.
11. 11 | Tuesday, October 9 | Baltimore, Maryland
Jacobs
www.jacobstechnology.com
H I R I N G
Application Security
Assessor/Penetration
Tester
Cyber Analyst- Tier I
Cybersecurity
Consultant - Senior
Red Team Operator -
Mid & Senior
SCA Engineer - Senior
Security Engineering
Technical Manager
Security Scripting
Engineer
SOC Analyst - Tier II &
Senior
Splunk Architect
Splunk Content
Developer
Splunk Engineer
Threat Intelligence
Analyst
Vulnerability
Management Engineer
Secret Clearance
Required
Information Security
Analyst
TS/SCI w/Polygraph
Required
Cybersecurity Threat
Analyst - Senior
Lifecycle Manager -
Senior
Systems Engineer - Mid
& Senior
Technical Writer
People Are Our Greatest Asset As a professional services company, our talented
employees are the key to developing and sustaining relationships: they invest time
with our clients, understand their businesses, retain that accumulated client
knowledge and pass it forward, and ultimately, our people deliver the work that adds
value to our clients’ businesses. We are committed to providing our employees with
an inclusive environment and meaningful work through which they can make lasting
contributions as they develop and grow their careers with us.
We Are Relationship Based This core value is our client-focused value. It describes
our objective to create and maintain ongoing business relationships with our clients.
We deliver superior and measurable value that exceeds what our clients can find
elsewhere. We serve as their advocates and support them in their global aspirations.
In simplest terms, our “relationship” value establishes an expectation of service,
trust, and business partnership.
Growth Is An Imperative We are a for-profit business. We make a commitment to
our shareholders to perpetually grow our net earnings by an average of 15 percent
every year, giving them a dependable return on their investment. The value of our
company improves as we grow, creating benefits for all our stakeholders: investors,
clients, employees, and those in the geographies where we operate.
12. 12 | Tuesday, October 9 | Baltimore, Maryland
Leidos
www.leidos.com/careers
H I R I N G
CND Analyst
Cyber Analyst Support
Specialist
Cyber CI Analyst
Cyber Intelligence
Analyst
Cyber Intelligence
Watch Officer
Cyber Lab Manager
Cyber Security Analyst
Cyber Security Engineer
Cyber Security Engineer
– Firewall
Help Desk Specialist
Information Systems
Security Officer
Malware Specialist
Network Engineer
Network Threat
Forensics Support
Specialist
SIGDEV Analyst
Systems Administrator
Systems Engineer
Technical and Cyber
Threats Analyst
VISION
To be a recognized global leader in solving important problems in National Security,
Engineering and Health. Through the inspired work of our diverse employees, we will
deliver innovative, scalable solutions for our customers. We will do this with
sustainability in mind, while also caring for our employees and the communities in
which we operate.
MISSION
Through our culture of innovation, we will develop deep customer trust and create
enduring solutions that improve our world.
VALUES
INSPIRED to make a difference
We are committed to solving the world’s toughest problems. We achieve this by
connecting our employees’ knowledge and our superior technologies across Leidos
in pursuit of answers. We know that by embracing the differences of all employees
we will unlock the creativity and innovation that makes a difference.
PASSIONATE about customer success
We are determined to understand and respond to our customers’ needs as if they
were our own. This plus our dedication to deliver superior results ensures that we will
create solutions that lead our markets.
UNITED as a team
We are bound together by our conviction that ethics and integrity are core to how we
operate. We engage with others from a basis of trust because we believe that
everyone is doing his or her best and wants to do the right thing. Therefore, we
collaborate and share to create value for our employees, our shareholders and our
communities.
INTEGRITY is the foundation for all that we do
At Leidos we have a steadfast commitment to integrity and ethical behavior in all that
we do. This includes interactions with employees, customers and our communities.
13. 13 | Tuesday, October 9 | Baltimore, Maryland
Mission Essential
www.missionessential.com | SECURITY CLEARANCE REQUIRED
H I R I N G
Geolocation Operator
Target Analyst Reporter
Target Digital Network
Analyst
C3 Systems Analyst
EW Analyst
Systems Analyst
ELINT Watch Stander
SIGINT Analyst
DCGS Analyst
VOIP Engineer
Enterprise Tools
Engineer
Configuration
Management Engineer
Maritime Imagery
Analyst
Test Engineer
Mission Assurance
Analyst
Remote Tier II Support
Remote Monitor
Queue Coordinator h
Quality Assurance
Technical Editor
Network Technician 1
Network Technician
Network Engineer
IT Technician Tier 2
IT Technician 1
Desktop Support Tech
CDRL Management
Analyst
Infrastructure Analyst
Tier 2 Network
Technician
UNIQUE MISSIONS. BEST-IN-CLASS EXECUTION.
Mission Essential Personnel, LLC is a veteran owned and operated partner to the
Intelligence, Defense, and Law Enforcement communities. We have deployed
thousands of analysts, operators, linguists and other specialists worldwide to support
and serve alongside the U.S. Warfighter in some of the most austere and remote
locations around the world. Mission Essential is your trusted source for
comprehensive multi-disciplined Intelligence operations, Language and Socio-
Cultural services, ISR, and Cyber.
We deliver tailored solutions in Intelligence Analysis and Operations to U.S.
Intelligence, Defense, and Law Enforcement customers around the world. We
provide All-Source, SIGINT, CI/HUMINT, GEOINT, and OSINT professionals who
enable mission success at the tactical, operational, and strategic levels.
WHO WE ARE: Peerless talent using the most advanced technology to deliver
mission essential, innovative solutions.
WHO WE SERVE: Defense, diplomatic, intelligence community, and law
enforcement customers, as well as multinationals and friendly foreign governments.
HOW WE DO IT: Leverage top talent and a constellation of extraordinary partners.
Low overhead, a flat organizational structure, a collaborative culture of crisp, real-
time decision making and action to deliver the plan. Demonstrate unrivaled agility
and efficiency by overcoming the obstacles that encumber large complex
organizations. Provide clarity, certainty, urgency, and efficiency.
EXPERIENCE: For over a decade, we have served customers at the strategic and
tactical levels, providing operational solutions to the U.S. Departments of Defense,
State, and Homeland Security; the Intelligence Community; friendly foreign
governments; and multinational corporations.
14. 14 | Tuesday, October 9 | Baltimore, Maryland
National Security Agency
www.nsa.gov
H I R I N G
Cyber
Computer Network Analyst
Cyber Network Professional
(Offensive/Defensive
Operations)
Data Center Network Server
Virtualization Engineer
Cyber Operations
Exploitation Manager
Network Professional
(Network Engineer/Network
Architect)
Computer Science
Computer Systems Architect
Computer Systems
Researcher
Cryptanalytic Computer
Scientist
Cyber Security Developer
Data Scientist
Digital Network Exploitation
Analyst
Software Engineer
Software/Hardware Project
Manager
Cyber Mitigations
Engineer/System
Vulnerability Analyst
Information System Security
Professional
Student Programs
Computer Science Intern
Program (CSIP)
Cyber Summer Program
Summer Program for
Operations Research
Technology
The National Security Agency/Central Security Service (NSA/CSS) is home to
America's codemakers and codebreakers. The National Security Agency has
provided timely information to U.S. decision makers and military leaders for more
than half a century. The Central Security Service was established in 1972 to
promote a full partnership between NSA and the cryptologic elements of the armed
forces.
NSA/CSS is unique among the U.S. defense agencies because of our
government-wide responsibilities. NSA/CSS provides products and services to the
Department of Defense, the Intelligence Community, government agencies,
industry partners, and select allies and coalition partners. In addition, we deliver
critical strategic and tactical information to war planners and war fighters.
By its very nature, what NSA/CSS does as a key member of the Intelligence
Community requires a high degree of confidentiality. Our Information Assurance
mission confronts the formidable challenge of preventing foreign adversaries from
gaining access to sensitive or classified national security information. Our Signals
Intelligence mission collects, processes, and disseminates intelligence information
from foreign signals for intelligence and counterintelligence purposes and to
support military operations. This Agency also enables Network Warfare operations
to defeat terrorists and their organizations at home and abroad, consistent with
U.S. laws and the protection of privacy and civil liberties.
NSA/CSS exists to protect the Nation. Our customers know they can count on us
to provide what they need, when they need it, wherever they need it.
15. 15 | Tuesday, October 9 | Baltimore, Maryland
Parsons
parsonscyber.com | SECURITY CLEARANCE REQUIRED
H I R I N G
Cloud DevOps Engineer
Enterprise Systems
Engineer
DoD Systems Architect
Senior Network
Engineer (Firewall)
DevOps Sensor
Integrator
Software Reverse
Engineer
Systems Engineer
C# Software Developer
Cyber Security / Test
Engineer
Parsons is leading the way in the field of cyber security. For over 30 years, Parsons
has delivered cyber and converged security services to protect our nation’s most
sensitive information and critical infrastructure. Be part of a team that will propel your
career forward as you solve some of the toughest cybersecurity challenges facing
our US government and worldwide industrial customers today. We’re looking for the
kind of people who see this opportunity and don’t hesitate to act. Parsons is a leader
in the world of Technical Services. We hire people with a broad set of technical skills
who have proven experience taking on some of the greatest challenges. Parsons
makes the world a safer place.
16. 16 | Tuesday, October 9 | Baltimore, Maryland
Perspecta
www.perspecta.com | SECURITY CLEARANCE REQUIRED
H I R I N G
Systems Engineers
ISSO
ISSE
Systems Administrator
Joint Operational
Planner
Cyberspace Analyst
Software Engineer
Process Engineer
Web Developer
Cyber Security Engineer
Knowledge
Management Analyst
Technical Writer
Every day at Perspecta, we enable hundreds of thousands of people to take on our
nation’s most important work. We’re a company founded on a diverse set of
capabilities and skills, bound together by a single promise: we never stop solving our
nation’s most complex challenges. Our team of engineers, analysts, developers,
investigators, integrators and architects work tirelessly to create innovative solutions.
We continually push ourselves—to respond, to adapt, to go further. To look ahead to
the changing landscape and develop new and innovative ways to serve our
customers.
Perspecta works with U.S. government customers in defense, intelligence, civilian,
health care, and state and local markets. Our high-caliber employees are rewarded
in many ways—not only through competitive salaries and benefits packages, but the
opportunity to create a meaningful impact in jobs and on projects that matter.
Perspecta’s talented and robust workforce—14,000 strong—stands ready to
welcome you to the team. Let’s make an impact together.
17. 17 | Tuesday, October 9 | Baltimore, Maryland
Raytheon
jobs.raytheon.com | SECURITY CLEARANCE REQUIRED
H I R I N G
Senior Vulnerability
Researcher
Malware Analyst/
Reverse Engineer
CNO Developer
Raytheon Company is a technology and innovation leader specializing in defense,
civil government and cybersecurity solutions. Founded in 1922, Raytheon provides
state-of-the-art electronics, mission systems integration, capabilities in C5I
(command, control, communications, computing, cyber and intelligence), sensing,
effects and mission support services. Raytheon is headquartered in Waltham,
Massachusetts.
18. 18 | Tuesday, October 9 | Baltimore, Maryland
SAIC
www.saic.com
H I R I N G
Fort Meade MD –
TS/SCI or Higher
Cyberspace Analyst
Cyber Operations
Engineer
Cybersecurity Engineer
Cyber Operations
Planner
Cyber Network
Defense/Incident
Response Analyst
Virtualization Engineer
* All positions in Maryland
require an active security
clearance.
** Some positions in Virginia
do not require a clearance
to start but the applicant
must be clearable.
Make a Difference with SAIC
As you consider a career at SAIC, you will find countless opportunities to contribute to
solutions that are changing the world in real and measurable ways in our technical,
engineering, intelligence, and enterprise IT business areas.
Innovative Applications of Technology and Expertise
We design, develop, and sustain offerings that empower diplomatic missions, support
warfighter requirements, and advance exploration from the ocean floor to outer space. We
maintain leadership positions in supply chain management, hardware integration, and global
network integration. Our diversified contract base enables us to provide end-to-end
capabilities and solutions across mission and enterprise lifecycles.
We do all this with the constant and deliberate commitment to ethical performance and
integrity that has marked SAIC since its founding.
Supporting Programs of National Importance
SAIC has a strong commitment to supporting programs of national importance—helping to
solve or undertake our country’s most significant problems. We offer a broad range of
services and solutions to address our customers' most complex and critical technology-
related needs.
SAIC's Core Values
Our core values define our culture and the way in which we conduct business. They form the
basis of our conduct and govern our decisions. At SAIC, how we behave is as important as
the results we achieve. An underlying principle of our conduct is our commitment to uphold
the highest ethical standards in ourselves and those around us.
Integrity Our culture of ingenuity is rooted in our passion for doing what is right and
delivering on our commitments. Integrity, respect and trust have been an integral part
of our company since day one and are fundamental to our decisions and behaviors.
Mission Understanding Our ingenuity starts with the understanding of our
customers’ opportunities and challenges. Before we begin the process of designing a
solution, we use our deep customer knowledge to define what’s needed to ensure
mission success.
Empowerment Redefining ingenuity depends on team entrepreneurialism and
empowerment for the good of the enterprise. Ingenuity happens when our people are
encouraged to explore, leverage expertise and knowledge from across the company,
accept responsibility for outcomes, and hold ourselves and others accountable for
results.
Creativity We’re redefining ingenuity through our collective creativity. We build on
the inventiveness and expertise of our exceptional people and our partners to quickly
get to smarter and more innovative solutions.
19. 19 | Tuesday, October 9 | Baltimore, Maryland
SURVICE Engineering
www.survice.com
H I R I N G
APG MD
Cybersecurity Research
& Development
Engineer
Cybersecurity Analyst
Cybersecurity
Engineer/Analyst
Cybersecurity Analyst
Huntsville AL
Cybersecurity Engineer
Fort Belvoir VA
Cybersecurity
Engineer/Analyst
Washington DC
Cybersecurity Analyst
Springfield VA
Software Engineer
Database Administrator
Software Tester/Tech
Writer
Today, with nearly 400 employees and numerous locations across the country, the
SURVICE Engineering Company continues to provide these unparalleled services,
particularly in the areas of combat system safety, survivability, and effectiveness. In
addition, we have continued to grow to match the needs of our customers, expanding
and enhancing our capabilities to support the DoD community, as well as the
homeland security, advanced technologies, environmental, and commercial markets.
But we have also worked hard to retain the original vision upon which SURVICE was
founded—to provide the warfighter with the safest, most survivable, and most
effective equipment possible.
20. 20 | Tuesday, October 9 | Baltimore, Maryland
U.S. Cyber Command
www.uscybercom.mil
H I R I N G
Capability Analyst
Lab Manager
Experimentation Lead
Test & Evaluation
Specialist
Executive
Communications
Systems Engineer
Operations Planning
Specialist
Plans & Policy Officer
OPSEC Manager
Deputy Inspector
General
Security Officer
Guard/Reserve Advisor
Privacy Act Specialist
Future Ops Planner
Information Technology
Specialist
Logistics
Safety Manager
Human Capital / Human
Resource Strategist
Cyber Trainer &
Instructional Analyst
Cyber Exercise Planner
Cyber Scenario
Developer
Cyber Doctrine Analyst
Cyber Modeling &
Simulation
Cyber Workforce
Development Analyst
Cyber Program Analyst
Budget Analyst
Ops Research Analyst
USCYBERCOM plans, coordinates, integrates, synchronizes and conducts activities
to: direct the operations and defense of specified Department of Defense information
networks and; prepare to, and when directed, conduct full spectrum military
cyberspace operations in order to enable actions in all domains, ensure US/Allied
freedom of action in cyberspace and deny the same to our adversaries.
The Command has three main focus areas: Defending the DoDIN, providing support
to combatant commanders for execution of their missions around the world, and
strengthening our nation's ability to withstand and respond to cyber attack.
The Command unifies the direction of cyberspace operations, strengthens DoD
cyberspace capabilities, and integrates and bolsters DoD's cyber expertise.
USCYBERCOM improves DoD's capabilities to operate resilient, reliable information
and communication networks, counter cyberspace threats, and assure access to
cyberspace. USCYBERCOM is designing the cyber force structure, training
requirements and certification standards that will enable the Services to build the
cyber force required to execute our assigned missions. The command also works
closely with interagency and international partners in executing these critical
missions.
Learn more about USCYBERCOM here: https://www.cybercom.mil/
Open Positions:
The DoD Cyber Expected Service (CES) is an enterprise-wide approach for
managing civilian cyber professionals across the Department. The CES is aligned to
both Title 10 and Title 5 provisions in that it offers flexibilities for the recruitment,
retention, and development of cyber professionals across Department. Under CES,
USCYBERCOM now brings on new hires under the excepted service (GG grades)
instead of the competitive service (GS grade). Experience is highly valued in the
CES, which transcends the typical time-based approach in the competitive service.
Promotions in the CES are qualification-based with no time-grade requirements
required for advancement. Interested candidates can send inquiries and resumes to
our recruiting inbox: cyber_recruiting@cybercom.mil
21. 21 | Tuesday, October 9 | Baltimore, Maryland
U.S. Secret Service
www.secretservice.gov
H I R I N G
Law Enforcement
Special Agents
(Investigators)
Uniformed Division
Officers
Information Technology
Specialist (DC-Data
Science and BI-
Business Intelligence)
The United States Secret Service is a federal law enforcement agency with
headquarters in Washington, D.C., and more than 150 offices throughout the United
States and abroad. The Secret Service was established in 1865, solely to suppress
the counterfeiting of U.S. currency. Today, the agency is mandated by Congress to
carry out dual missions: protection of national and visiting foreign leaders, and
criminal investigations.