Embed security best practices such as security requirements, threat modelling, secure code review, automated security controls. Lead, mentor and develop a team of cybersecurity architects/engineers/information security analysts to promote excellence, diversity, inclusion, and manage delivery with co...
The Chief Technology Officer (CTO) position is assigned to the Executive Team, reporting to the Chief Operating Officer. The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovatio...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...
Partner with NREL operational units to identify, analyze and mitigate security risk for NREL information systems utilizing IT controls. Maintain policies and procedures that support the security and privacy of NREL’s information technology operating environment. Perform security and privacy risk ass...
Responds to reported security violations and assists in Company-wide security awareness. Creates, maintains, and manages all security polices, standards, and processes for the company. Assess and create a comprehensive security vendor review process to ensure 3rd party compliance. Manage and conduct...
ROle : Security SpecialistLocation : Remote type: Contractual Describe the must have technical skills/experience of the position in priority order: Database Administration Business requirements documentation and process improvement Database Activity Monitoring Imperva. ...
The IT Security Specialist will be responsible for securing our organization's digital assets across a diverse technology stack that includes Okta, Office365, Salesforce, Oracle Fusion, Windows Server (2016 and 2022), CrowdStrike, Qualys, and various other applications. The ideal candidate will poss...
CACI is seeking an Information System Security Officer (ISSO) as part of our DHS’ Security team and plays a Cybersecurity operational compliance role. Works closely under the supervision of Cybersecurity Manager and with other security personnel within our DHS operations to ensure operational securi...
IntelliBridge is an award-winning national security company looking for an Information Systems Security Officer (ISSO) in support of multiple systems within a federal agency. Information Systems Security Officer (ISSO). Information Systems Security Officer (ISSO). Must have 3-10 years of experience ...
Your responsibilities will be varied and dynamic, spanning asset classification models, risk assessment reports, information security policies, security solution scenarios, implementation plans, organization models, procedures, security services, security effectiveness evaluation reports, and securi...
The IT Security is responsible for ensuring network security, compliance, management of development team, user training, and other IT duties. The IT Security Officer reports directly to the General Manager. Monitors, analyses, and responds to security alerts. ...
ACI fabric security and Layer 4 to Layer 7 integrations with ACI management features. IOS, NX-OS and XE hardening for security. ...
The Information Systems Security Officer (ISSO) will support the development and maintenance of Authority to Operate (ATO) packages, provide cybersecurity planning, and ensure compliance with relevant security standards and guidelines. Provide cybersecurity planning and maintenance services, includi...
As a Security Services Specialist you will apply your cyber security knowledge and skills to defend our clients from increasingly complex and persistent cyber threats using advanced industry leading security tools and products, best practices, and following robust security operations processes and p...
Assists Security staff, programmers and technical staff with implementing design solutions that meet Voya’s security controls. Uses Security monitoring tools to review, investigate, and recommend appropriate corrective actions for data security incidents. Participates in the development, maintenance...
Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruc...
The Chief Information Security Officer (CISO) is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Professional security management certifications, such as a Certified Information Systems ...
Understanding of shared security model within OCI including data security, account and identity, application, network controls and Operating System security. Cloud Information Systems Security SpecialistJob Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: None...
The Deputy Chief Information Security Officer (DCISO) will lead activities in support of cybersecurity priorities in support of functional and organizational goals. The DCISO will be responsible for developing and maintaining a security architecture process, the security operations center (SOC), net...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...