As a Cybersecurity A&A Analyst, you will work with a team responsible for all aspects of cybersecurity support to the hybrid-cloud enterprise hosting environment. We are seeking a Cybersecurity A&A Analyst to:. In addition, you will support vulnerability analysis and self- assessment technical analy...
NOT REMOTE, MUST HAVE A SECURITY CLEARANCE. MoveAmerica is seeking a highly skilled and experienced Financial Analyst to provide comprehensive financial analysis and support to the DoD Office of Small Business Programs, specifically assisting with the execution and management of Mentor Protégé Progr...
As a Cybersecurity Analyst, you will work with a team responsible for all aspects of cybersecurity support to the hybrid-cloud enterprise hosting environment. We are seeking a Cybersecurity Analyst to:. Coordinating with independent verification and validation team and program office ISSM cybersecur...
EPIC Cadence Applications Analyst. Position: EPIC Cadence Applications Analyst (Job Id - #. Under the direction of an Application Manager, the Application Analyst performs troubleshooting, maintenance, and optimization of existing software applications. The Analyst must achieve in-depth knowledge of...
NOT REMOTE, MUST HAVE A SECURITY CLEARANCE. MoveAmerica is seeking a highly skilled and experienced Financial Analyst to provide comprehensive financial analysis and support to the DoD Office of Small Business Programs, specifically assisting with the execution and management of Mentor Protégé Progr...
Cyber Security Analyst provides security guidance and expertise and performs and coordinates design, development, maintenance, and quality control functions on highly complex computer security projects. Regularly develops solutions to significant business operations computer security problems by app...
Work closely with the Global Security Operations team members, Information Technology, business units, and management to implement and enforce security policies and procedures. Review new and existing systems to ensure baseline security requirements are met and to recommend security enhancements. Ha...
Security analysts are responsible for analyzing system and application security and making recommendations that optimize the protection of our computer systems and information resources. Security analysts develop, test, implement and maintain security policies and programs. The Information Security ...
Plans, develops, coordinates, and presents cyber security awareness training and education for cyber security operations, evaluates training program effectiveness, conducts job task analysis, security audits, surveys, and special studies. Prepares and assures the implementation of cyber security pol...
MessageBody">Position : Security Analyst II</b></div> <div><b>Location : Remote</b></div> <div><b>Duration : 12 Months with EXT </b></div> <div> </div> <div>Security analysts are responsible for analyzing system ...
Information Security Analyst - Audit and Compliance (Onsite & Remote (hybrid) working schedule required)101 Truman Medical Center. Works with contracted technology solutions providers to validate security risk assessments on new applications, equipment, or systems under review for adherence to secur...
Collaborate with IT and security teams to implement and improve security policies and procedures. Monitor and analyze security events and alerts generated by LogRhythms platform. Provide guidance and support to clients on best security practices. Stay updated on the latest cybersecurity trends...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Develops security policy to comply with security requirements as defined by the customer and provides input to the customer as requested when the customer develops security requirements. Evaluates security requirements and conducts feasibility studies to examine software requirements, administration...
Key Management Services Analyst. Background in Help Desk or Network Command Center, emphasizing Information Security. Operate key management systems adhering to security protocols. IT Security, cryptography, and payment authorization systems. ...
Create, tailor, and audit security baselines for operating systems and applications. Certification of systems and applications to ensure compliance with KUMC security requirements. Maintaining and updating of security systems and tools. Perform real-time security log and event analysis and take acti...
Qualified candidate must be able to obtain an Interim DoD Secret Security Clearance prior to starting this position with the ability to obtain a final Top Secret DoD Security Clearance. Qualified candidate must be able to obtain an Interim DoD Secret Security Clearance prior to starting this positio...
AFCAP V Middle East BOS: Quality and HSE Specialist. AFCAP V Middle East BOS Quality and HSE Specialist. ...
As a Cybersecurity Engineer, you will support an Information System Security Manager (ISSM) and Information System Security Officer (ISSO) and collaborate with a team responsible for all aspects of cybersecurity support to the hybrid-cloud enterprise hosting environment. Coordinating and collaborati...
Systems Engineering lifecycle knowledge from requirements decomposition all the way through verification and transition to operations. Security Clearance Statement:. This position requires a government security clearance, you must be a US Citizen for consideration. ...
Designing, planning, engineering, implementing the network infrastructure for classified and unclassified networks including on-prem, hybrid-cloud and native cloud environments focused specifically on VMWare Cloud on AWS, AWS, and Azure. Maintaining networking documentation and security plans for ne...
We are building a Grants Compliance team who will be responsible for identifying compliance requirements during the grant award process and ensuring the requirements are met through the life of the grant. Create policy documents and bulletins to boil down required compliance activities, including co...
Performs Security Office, Employee Entrance and Patrol operations as outlined in the Standards of Performance Manual for Security Officers. Patrols front of house, back of house and exterior hotel areas, reporting any safety or security hazards, unacceptable behavior, or suspicious persons to Securi...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Collaborate with IT and security teams to ensure compliance with security policies. Experience as a Microsoft Security Engineer or similar role. Proficiency in Microsoft security technologies and tools, including Purview Information Protection, DLP, data lifecycle management, records management, and...