Information Technology Supervisor supervises employees of the information technology department in accordance with organizational policies and goals. Ensures proper functioning of the organization's information systems and makes upgrades as necessary. Being an Information Technology Supervisor helps business operations groups utilize information systems to improve their efficiency. Keeps computer equipment, hardware, and software updated to meet organizational needs. Additionally, Information Technology Supervisor follows appropriate programming procedures. Responds to complex, escalated matters and ensures projects are conducted effectively and recommendations and reports are accurate and timely. A level II supervisor has authority for personnel actions and oversees most day-to-day operations of group. May require a bachelor's degree. Typically reports to a manager or head of a unit/department. The Information Technology Supervisor supervises a small group of para-professional staff in an organization characterized by highly transactional or repetitive processes. Contributes to the development of processes and procedures. Thorough knowledge of functional area under supervision. To be an Information Technology Supervisor typically requires 3 years experience in the related area as an individual contributor. (Copyright 2024 Salary.com)
Vulnerability analysis, penetration testing, computer forensics.
We're searching fortalented individuals who provide technology vulnerability analysis.This program will maximize the effectiveness and efficiency of our country's most important missions both at home and abroad. If you are ready to support a high-performing team that truly makes a difference, thencome join us!
Job Description:
Support the identification of vulnerabilities of and attacks against specific technologies. Analyze attack techniques and develop countermeasures. Produce formal and informal reports, and briefings relating to system vulnerability analysis.
The Level 2 Technology Vulnerability Analyst shall possess the following capabilities:
Identify vulnerabilities of specific technologies. Characterize those attacks with respect to resources and capabilities required to accomplish those attacks. Compare and contrast attack techniques and develop effective countermeasures. Produce formal and informal reports, briefings, and perspectives of actual and potential attacks against the technologies being studied.
Qualifications:
Relevant experience must be in vulnerability analysis, penetration testing, and/or computer forensics. In addition, may include computer or information systems design/development, programming, information/cyber/network security, systems engineering, and/or network and/or system administration.
Position requires active Security Clearance with appropriate Polygraph
Pay Range: $100,000 - $136,000
The RealmOne pay range for this job level is a general guideline only and not a guarantee of compensation or salary. Our approach to crafting offers considers various factors to establish an equitable and competitive compensation package. These considerations include, but are not limited to, the extent and intricacy of the role's responsibilities, the candidate's educational background, their work experience, and the specific competencies crucial for success in the role.
Headquartered in Columbia, MD, RealmOne provides advanced technology services and solutions focused on cybersecurity, intelligence collection and analysis, data science and advanced analytics, and hyper-automation to support our country's most critical national security initiativ
We're an equal opportunity employer. All applicants will be considered for employment without attention to race, color, religion, sex, sexual orientation, gender identity, national origin, veteran or disability status.