We are looking for a talented student with career interest in cybersecurity, threat analytics, cloud computing/virtualization and AI, to own the junior level engineering responsibilities of the Lumen Technologies Public Sector security solutions. Lumen Black Lotus Security Group is currently seeking...
The Onsite Cyber Security Specialist will be responsible for supporting the day to day IT and Cyber related activities for a DHS customer located in the state of Florida. The Onsite Cyber Security Specialist will work closely with this customer to meet their regulatory compliance, and continuous mon...
Are you ready to help when disaster relief needs arise? We're building a team of dedicated security and logistics professionals who can step in at a moment's notice. The Watch Officer will be deployed to the WCK activation site and serves as a fusion role between the field and the operations center ...
ACI fabric security and Layer 4 to Layer 7 integrations with ACI management features. IOS, NX-OS and XE hardening for security. ...
The Senior Virtual Chief Information Security Officer(Senior vCISO) will provide strategic leadership and oversight for the information security programs of VC3 managed clients. One or more of the following qualifications: Certified Information Security Manager (CISM), Certified Information Systems ...
The Cybersecurity Specialist with both strong cybersecurity and network security delivery skills will need to have a deep technical understanding of Cybersecurity practices, delivering secure and reliable hardware and software solutions in short sprints. They will also be responsible for supporting ...
Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and securi...
CACI is seeking an Information System Security Officer (ISSO) as part of our DHS’ Security team and plays a Cybersecurity operational compliance role. Works closely under the supervision of Cybersecurity Manager and with other security personnel within our DHS operations to ensure operational securi...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...
As a lead within the larger Information Security Governance, Risk, and Compliance (GRC) organization, you will join our Customer Security Assurance program. If you appreciate that security is not just a cost-center, but a competitive advantage, this role will enable you to lead us building trust and...
Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruc...
Senior Cloud Security Specialist. The ideal candidate will be responsible for creating and maintaining security policies, as well as assisting in the implementation and automation of security solutions within cloud environments. With a strong understanding of cloud security services and excellent an...
The Chief Product Officer holds a key leadership position on the CIS Executive team at the Center for Internet Security. The Chief Product Officer is responsible for developing and managing a CIS wide product portfolio consisting of CIS-developed and third party integrated software products and serv...
The Information Systems Security Officer (ISSO) will support the development and maintenance of Authority to Operate (ATO) packages, provide cybersecurity planning, and ensure compliance with relevant security standards and guidelines. Provide cybersecurity planning and maintenance services, includi...
The Chief Technology Officer (CTO) position is assigned to the Executive Team, reporting to the Chief Operating Officer. The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovatio...
The Chief Information Security Officer (CISO) is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Professional security management certifications, such as a Certified Information Systems ...
DescriptionWe are seeking a highly motivated and experienced SAP S/4 Security Role Specialist to support a 6-month engagement focused on SAP S/4 security role requirement gathering and development. Required Skills : SAPAdditional Skills : Supply Chain Security SpecialistThis is a high PRIORITY requi...
Fleet Services by Cox Automotive keeps your fleet moving! .Headquartered in Indianapolis, .Fleet Services by Cox Automotive.FSCA) has grown to become one of the largest fleet maintenance companies in the country.FSCA is the leading provider of on-site mobile maintenance and repair services nationwid...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...
We are excited that you are thinking about opportunities with us, and we have an amazing story to share.Here's a quick glance of who we are and the impact you could have on the food service industry.There's a seat at our table for you.Monday to Friday schedule, starting around 4h-5h am.Medical, Dent...
The Chief Information Security Officer will be the leader of Information Security at Included Health. Execute leadership and oversight for the implementation and automation of security capabilities, systems, and services - drive and evangelize the different functions within Information Security to b...
Embed security best practices such as security requirements, threat modelling, secure code review, automated security controls. Lead, mentor and develop a team of cybersecurity architects/engineers/information security analysts to promote excellence, diversity, inclusion, and manage delivery with co...