Demonstrated passion for cyber security, good understanding of security operations, cyber defense, network security, threat intelligence, incident response. Exhibiting familiarity with Cloud Security Alliance, Center for Internet Security, ISC2, and SANS Cloud Security Standards for securing cloud a...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect - Healthcare Delivery Technology serves as the most senior security architect and advance...
We are seeking a highly skilled and experienced Senior Threat Intelligence Data Architect with a strong focus on cybersecurity. As a Senior Threat Intelligence Data Architect, you will be responsible for designing secure and scalable architecture solutions to safeguard our organization’s critical in...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technol...
Develops/challenges enterprise-wide information security policies, procedures, and standards related to Service Account Governance with supporting industry leading information security reporting, risk scoring, and governance to ensure adherence to requirements. The Global Information Security (GIS) ...
Demonstrated experience in developing, implementing, and enforcing security policies, standards, and procedures to ensure regulatory compliance and protect organizational information assets. Working with the application leads, sysadmins, dbas, developers and testers to ensure the assigned systems ar...
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Pla...
We are seeking experienced intelligence analysts to conduct research and analysis and produce finished intelligence products and responses to RFIs on foreign intelligence and technology protection-related threats to the US Army and the DoD worldwide. This role conducts analysis using intelligence an...
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
Own all aspects of SOP compliance. Respond to PO compliance cases per SOP, reset forms, escalate to FTEs for scope decisions. ...
The Security Officer receives general direction from the Security Manager, Supervisor or Lead Security Officer. This posting is for multiple openings of Security Officer at Providence Sacred Heart Medical Center & Children's Hospital in Spokane, WA. Security Officer at Providence Sacred Heart Medica...
Ensures efficacy of data and information solution delivery, including prioritizing technology debt, compliance, and security items and supports application performance in production, including application health, resiliency, security, enterprise data management standards, global records management s...
Pre-assignment evaluations of each security officer will assess the suitability of the officer to CDC’s security program. The Lieutenant / Lead Security Officer enforces regulations designed to prevent breaches of security; exercises judgment and uses discretion in dealing with whether first respons...
Description & Requirements The Compliance Management Analyst will support OS in various aspects, including, but not limited to, OS Security Compliance, collaboration with OS Staff Divisions (StaffDiv), coalition building, and awareness programs that promote all OS Cybersecurity initiatives. Thi...
Candidates for this role must understand how NAV solutions round out capabilities and processes within the security operations center (SOC) and the availability of managed security services (MSS) to gain access to additional security expertise, increase security detection and response capabilities, ...
A successful candidate will have excellent technical skills focused in the security operations space, impeccable soft skills, and be a well-organized, self-directed individual with familiarity working for a service-based information security organization. Our client is looking for candidates to supp...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Minimum of 5 years of experience in Security Engineering or Development of Security capabilities, supporting engineering projects from concept to delivery, and 2 years in *two or more* of the following technical categories:. You will be responsible for conducting security reviews including hands on ...
The Security Officer is a key position on our Security Services team. You will own the responsibility for the security and safety of MultiCare patients, employees and visitors. You will conduct general security in the protection of people and property and the enforcement of all applicable policies, ...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
Inter-Con employs over 25,000 security officer personnel world-wide, trained and managed by a team of professionals with unsurpassed military, law enforcement, and security experience. As an Armed Security Officer, you will be part of a highly trained security team that supports critical facilities ...
The Network Security Assurance Operations Lead will be primarily responsible for the maintenance of the Network Boundary Protection team’s configuration management and network security implementation monitoring processes. Responsible for timely review and decision of network security engineering imp...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
Cyber Security Technology (CST) is a globally distributed team responsible for cyber security innovation, architecture, engineering, solutions and capabilities development, cyber resiliency, access management engineering, data strategy, deployment maintenance, technical project management and inform...