"We're Local. We understand the niche cybersecurity market & staffing need. We provide a platform connecting local leading companies and highly qualified job seekers by creating an economic opportunity for all individuals living in the Washington D.C. Metro Area."  

Job seekers

Post your resume to start your career search.
Post resume


Advertise your jobs here to get qualified applicants.
Post a job

Blog Articles

Cybersecurity continues to be one of the fastest-growing fields. Thousands of job postings go unfilled. If you're eager to transition from your current job to a career in cybersecurity, this is the course for you. Learn how to leverage the skills and experience you already have—whether your background's in IT, security, or another tech field—to build a lucrative and successful new career. Find out how to identify the right cybersecurity specialization, pinpoint any skills gaps, and gain the skills you're missing. You can also explore different certifications to help jump-start your career and master the IT basics you'll need to land your first job. Plus, get powerful resume and interview strategies, tips, and resources for increasing the chances that your transition to cybersecurity will be a success. Learning Objectives: Identifying your potential Targeting a career or specialization Researching jobs Locating training Shadowing cybersecurity experts Earning certifications Studying IT basics Revising your resume Applying for jobs Acing the interview Networking Creating a professional brand Link to Course Video:   https://www.linkedin.com/learning/transitioning-to-a-career-in-cybersecurity/transitioning-to-a-career-in-cybersecurity            Instructor: Marc Menninger            IT Security Manager
You landed an interview for a job in one of the most exciting, fast-growing fields in technology: cybersecurity. In this course, learn what to do before, during, and after your interview to significantly increase your chances of landing the cybersecurity position you're vying for. Instructor Tu Laniyonu highlights the three types of interview formats you'll likely encounter; shares common questions you should expect to answer (and ask); and shows how to craft an effective self-promotion strategy. Plus, he shares tips for thriving in telephone and in-person interviews, as well as what to do after an interview to ensure you leave a good first impression. Learning Objectives: The anatomy of the cybersecurity interview Three common types of interviews Crafting your self-promotion strategy Preparing to ask and answer common questions Thriving in a telephone interview What to avoid in in-person interviews Closing strong Link to Course Video:  https://www.linkedin.com/learning/nail-your-cybersecurity-interview/transforming-your-cybersecurity-career Instructor: Tu Laniyonu Digital Forensics Engineer and Cybersecurity Career Strategist
The Department of Interior awarded CenturyLink a contract potentially worth $1.6 billion for network security and IT modernization. Under the contract, a task order award under the GSA’s Enterprise Infrastructure Solutions program, CenturyLink will provide Interior with managed core network services and managed access services. The contract has a base period of one year, a CenturyLink spokesperson said. According to the news release, there are 11 one-year options through 2032. “The Department of the Interior selected CenturyLink to deliver secure, modern network services that will help the agency achieve its mission to conserve and manage our nation’s natural resources and cultural heritage for the benefit and enjoyment of the American people,” said David Young, CenturyLink senior vice president of public sector, in a statement. CenturyLink’s managed core network services includes designing, engineering, building, securing, operating and maintaining Interior’s enterprise network, along with cybersecurity services. The second area, manage access services, included securing cloud connectivity and WiFi services. The EIS program is a 15-year, $50 billion multi-award contract vehicle for federal agencies to use to purchased pre approved, secure IT and telecommunication services. CenturyLink was the first supplier given EIS authority to operate last March. In April last year, CenturyLink also won a task order under the contract to provide secure connectivity services to NASA, the first task order under the EIS program. Link:  https://www.federaltimes.com/it-networks/2020/01/16/who-won-interiors-16b-secure-network-contract/ By:  Andrew Eversden
View all blog posts

Cyber Security Event Tracker

January — March 2020

Cyber Security for Critical Assets, MENA 2020 (Dubai, United Arab Emirates, January 20 - 21, 2020) The 17th in a global series of Cyber Security for Critical Assets summits, #CS4CA MENA 2020 focuses on safeguarding the critical industries of the Middle East and Northern Africa from cyber threats. CS4CA...

CPX 360 New Orleans (New Orleans, Louisiana, USA, January 27 - 29, 2020) Mark your calendar now for CPX 360 2020, the world’s premiere cyber security summit of the year. Globally renowned industry experts will take to the stage to share analysis, core insights, and actionable...

Smoo Con (Washington DC, January 31 – February 2) ShmooCon was founded by the Shmoo Group, the organization responsible for Linux Apache, OpenSSL, Snort, PGP and even the DEF CON contest Capture the Capture the Flag. This long-running and popular hacker conference is held annually and features over 30 security-focused presentations that tackle security topics regarding new ways of exploitation, innovative software and hardware solutions and important cybersecurity questions.

Suits & Spooks, 10th Anniversary: Taking Ownership of the Future of our Security (Washington, DC, USA, February 6 - 7, 2020) The theme of Suits and Spooks DC for 2020 is “Taking Ownership of our Security Challenges for the Next 10 Years”. The keynote speaker will be General Stan McChrystal, a U.S. Army, retired, former Commander of U.S. and International Forces in Afghanistan, former Commander of Joint Special Operations Command, and founder of the McChrystal Group. 

RSA Conference 2020 (San Francisco, California, USA, February 24 - 28, 2020) Be part of a conversation that has the power to change the world. Join top cybersecurity leaders and a dedicated community of peers as we exchange the biggest, boldest ideas that will help propel the industry...

InfoSec Connect 2020 (San Diego, California, USA, March 15 - 17, 2020) InfoSec Connect is a high profile, interactive meeting of senior-level cybersecurity leaders from top credit unions, US banks, insurances, and financial services companies. It’s a forum built to share...

April — December 2020

KNOW Identity (Las Vegas, Nevada, USA, April 5 - 8, 2020) The KNOW Identity Conference is the industry-leading identity event. With 2000+ attendees and 50+ content-rich sessions, KNOW is a powerful, immersive event, where the leading edge of digital identity...

RuhrSec 2020 (Bochum, Nordrhein-Westfalen, Germany, May 5 - 8, 2020) Since 2016, RuhrSec is the annual English speaking non-profit IT security conference with cutting-edge security talks by renowned experts. RuhrSec provides academic and industry talks, the typical University...

THOTCON (Chicago, IL, May 8–9) Due to its non-profit and non-commercial nature, THOTCON is a very affordable security conference that has a significant twist: the Chicago venue is not announced until the week leading up to the event (it’s top secret actually). The topics discussed at THOTCON range from IoT, intel gathering, medical devices, UI, industrial control systems and more.

BLACK HAT USA 2020 (Las Vegas, NV, August 1-6, 2020) The Black Hat conference held in the USA starts with four days of technical training followed by the two-day main conference comprised of Briefings, Arsenal, Business Hall and more. There are a couple of Black Hat Briefings held elsewhere on the globe, but the USA conference ranks highly in second place on this list for its speakers, content and cutting-edge concepts.

DefCON 28 (Las Vegas, NV, August 6-9, 2020) This cyber security event, founded in 1993, brings together amateur and hobby hackers, security researchers and professionals, journalists, government and federal employees and anyone interested in hacking and cyber security scene.

DC Metro Cyber Security Summit (Washington DC, October — December 2020) Connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. 

CyberCon 2020 (Bismarck, North Dakota, USA, October 6 - 7, 2020) Our vision for this annual event is “to bring awareness of Cyber Security through collaboration and education” and for 2020, we will again focus on the critically important roles that both cyber security...