Responds to reported security violations and assists in Company-wide security awareness. Creates, maintains, and manages all security polices, standards, and processes for the company. Assess and create a comprehensive security vendor review process to ensure 3rd party compliance. Manage and conduct...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...
The Chief Product Officer holds a key leadership position on the CIS Executive team at the Center for Internet Security. The Chief Product Officer is responsible for developing and managing a CIS wide product portfolio consisting of CIS-developed and third party integrated software products and serv...
We have an opportunity for a Security Specialist to join our talented Professional Services team. Support development and maintenance of security documentation such as the System Security Plan, Privacy Impact Assessment, Configuration Management Plan, Contingency Plan, Contingency Plan Test Report, ...
The Security Managed Services Engineer (L3) is responsible for providing a service to clients by proactively identifying and resolving technical incidents and problems. This role is responsible for managing tickets of high complexity, conducts advanced and complicated tasks, aware of clients high le...
The Chief Information Security Officer (CISO) is responsible for establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected. Professional security management certifications, such as a Certified Information Systems ...
The Security Risk Specialist will help steer the security risk management program, enabling all security and privacy teams to manage and drive decision making about security risks. As the Security Risk Management Specialist, you hold domain expertise in security risk management standards and framewo...
Determine information security requirements by evaluating organization business strategies and requirements, researching information security standards; conducting system security and vulnerability analysis and risk assessments, assessing industry architectures/platforms and relative security benefi...
Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or other certifications exemplifying skill sets such as those described in DoD Instruc...
The Chief Technology Officer (CTO) position is assigned to the Executive Team, reporting to the Chief Operating Officer. The Center for Internet Security (CIS) makes the connected world a safer place for people, businesses, and governments through our core competencies of collaboration and innovatio...
Understanding vulnerability assessment and security hardening process. Implement and troubleshoot network and security protocols. ...
The ideal candidate for the Information System Security Officer (ISSO) role is a seasoned security professional with over 10 years of experience in information system security management. The Information System Security Officer (ISSO) will oversee the security of ACL’s information systems, ensuring ...
The IT Security is responsible for ensuring network security, compliance, management of development team, user training, and other IT duties. The IT Security Officer reports directly to the General Manager. Monitors, analyses, and responds to security alerts. ...
The Virtual Chief Information Security Officer (vCISO) will provide strategic leadership and oversight for the information security programs of VC3 managed clients. One or more of the following qualifications are highly desirable: Certified Information Security Manager (CISM), Certified Information ...
Depending on the assignment, the ISSO/Systems Admin will provide experienced and qualified personnel to perform Cybersecurity support services to assist ACC Cybersecurity Chief Information Security Officer and unit Information System Security Officers (ISSO) in maintaining an effective cybersecurity...
They will show proficiency in vulnerability assessment and management tools, security incident response, and forensic investigation techniques, and will play a crucial role in maintaining the security posture of ACL’s information systems, ensuring compliance with federal regulations, and safeguardin...
The Information Systems Security Officer (ISSO) will support the development and maintenance of Authority to Operate (ATO) packages, provide cybersecurity planning, and ensure compliance with relevant security standards and guidelines. Provide cybersecurity planning and maintenance services, includi...
Technical Specialist - MS, Security. This role focusses across two or more technology domains - Cloud, Security, Networking, Applications and / or Collaboration etc. Network security devices HA configuration build, monitor & support. Monitor and Manage Network Security devices and related performanc...
Assists the Facility Security Officer (FSO) with security related projects and tasks that are routine in nature. Supports the security manager in the development of personnel security policies and procedures. Supports corporate efforts under the National Industrial Security Program (NISP). May suppo...
The Cybersecurity Specialist with both strong cybersecurity and network security delivery skills will need to have a deep technical understanding of Cybersecurity practices, delivering secure and reliable hardware and software solutions in short sprints. They will also be responsible for supporting ...