- Adapt Forward (Charleston, SC)
- ACAS Support Engineer Charleston, SC Minimum Secret Clearance Required with Upgrade to Top Secret As an ACAS Support Engineer you will be ... analysis, scan analysis/troubleshooting. You will primarily be responsible for infrastructure support and management of the Assured Compliance Assessment Solution (… more
- Textron (Goose Creek, SC)
- **Cyber Security Engineer I** **Description** **Who We Are** Textron Systems is part of Textron, a $14 billion, multi\-industry company employing 35,000 talented ... \- in this role, you will be responsible for: Providing cybersecurity engineering support on both next generation technologies and proven platforms that support … more
- KBR (North Charleston, SC)
- Title: Engineer , Computer POSITIONS ARE CONTINGENT ON CONTRACT AWARD KBR's Defense and Technology Solutions (DTS) business unit delivers comprehensive engineering ... solutions that drive defense and security advancements. Position Summary:The Engineer , Computer provides technical expertise in software engineering, systems design,… more
- CACI International (North Charleston, SC)
- Lead Systems Engineer Job Category: Information Technology Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of ... in the lives of today's military! CACI is looking for a Lead Systems Engineer with strong technical, interpersonal, and communication skills to join our team. The… more
- Adapt Forward (Charleston, SC)
- Endpoint Security Solutions Engineer Charleston, SC Minimum Secret Clearance required with upgrade eligibility to Top Secret As an ESS Engineer you will ... ePolicy Orchestrator servers and client-side application system components, as well as support the implementation and maintenance of ESS for DHA systems and other… more
- KBR (North Charleston, SC)
- …security policies are effectively implemented and followed. The analyst will support real-time monitoring of network assets, risk scoring, compliance auditing, and ... risks and vulnerabilities using automated security tools such as ACAS , HBSS, and SIEM platforms. - Perform security audits...and risk posture in compliance with DoD guidelines. - Support risk scoring efforts through the Continuous Monitoring and… more