The candidate must have a current Security Plus certification. Must possess and maintain a US Government Secret level security clearance. Note: US citizenship is required to obtain a US Government security clearance. Our hiring practices provide equal opportunity for employment without regard to rac...
Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks. Implemen...
Chief Technology Officer, VP of IT, Director of IT, VP of IT Operations, Director of IT Operations, Chief Information Officer, IT Manager, IT Consultant, Chief Data Officer, Chief Security Officer, Technology Manager, IT Operations Manager, Information Systems Manager. Legal, Information Technologie...
At least three (3) years of that experience must be in information security analysis. Three (3) years of experience within the last five (5) years as an Information Security Specialist, or similar, supporting an enterprise network environment with at least 50 servers, 2,000 or more users, and multip...
An Information Security Specialist interprets information security policies, standards, and other requirements as they relate to internal information system and coordinates the implementation of these and other information security requirements. The Information Security Specialist redesigns and reen...
Cloud Information Systems Security Officer (ISSO) - RemoteDepartment: GRCLocation:Text code 4444 to 202-915-6712 to apply!Since 2009, MindPoint Group has been the cybersecurity firm of choice for the most security-conscious US federal agencies and commercial enterprises. The ISSO will manage the ove...
Will be responsible for developing and maintaining a formal Information Systems Security Program, including managing cyber security, system administration, and network administration responsibilities. Shall have experience in Information Security (INFOSEC) operations and/or Cybersecurity-related sup...
Collaborate with senior leaders in decision-making processes by transforming information into life-saving intelligence. Integrating your skills with cutting-edge information collection technology, you will become a critical player in our team’s success. ...
In this highly transparent role, a successful candidate will have very good interpersonal and communication skills and be highly technical with the ability to relate Security impacts to the business (and business security impacts to GIS)!Responsibilities:Ensure business units understand the importan...
What Information Security and Risk contributes to Cardinal HealthInformation Technology oversees the effective development, delivery, and operation of computing and information services. QualificationsCloud computing platforms (AWS, GCP, Azure) Cloud security tools and technologies (CloudWatch, Clou...
Cyber Information Systems Security Manager. Global C2 Integration Technologies is looking for talented and enthusiastic Cyber Information System Security Manager (ISSM). Active US Government security clearance. Demonstrated leadership-level experience with administering and securing military informa...
The Information Security Audit Analyst is responsible for assisting with the planning, designing, and executing of IT audits to assess the adequacy of the information systems control environment. Bachelor’s in data analytics, IT security, or a related field and/or equivalent combination of education...
As the regional Information Security Manager, together with our HQ security leadership you will be responsible for developing and implementing comprehensive security policies and procedures, ensuring compliance with relevant regulations, and fostering a culture of security awareness across the organ...
As the SOC Manager, you will provide oversight for the Security Operations Center, providing real-time, continuous cybersecurity monitoring and triage, uninterrupted event detection, incident analysis, coordination and response, situational awareness, and cybersecurity countermeasure implementation ...
Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker, incorporating automated Benchmarks. Implemen...
Serves as a Field Office (FO) Information Security (INFOSEC) subject-matter-expert (SME), supporting all FO personnel with secure computing and digital management methodologies, working with the Chief Security Officer (CSO), Security Staff and other FO personnel as required to carry out a FO INFOSEC...
Information System Security Officer. CSEngineering is looking to add an Information Systems Security Officer to our growing team! This position will support the Federal Government Customer. Perform analysis of network security, based upon RMF JSIG, National Industrial Security Program Operating Manu...
General Dynamics Information Technology is pursuing an experienced candidate to fill the role of Security Training & Integration Analyst to assist with the instruction of Transportation Security Officers (TSOs) for the Transportation Security Administration (TSA). Security Training & Integration Ana...
Summary: The Information Systems Security Officer (ISSO) will be responsible for administering, assuring and maintaining a unique communication system network and maintaining the appropriate operational security posture in support of the ISSM. Developing and updating the system security system contr...
As an Information System Security Officer, you will be responsible for ensuring the security and integrity of our organization's informationsystems. Experience in Information Assurance / Cybersecurity, including development, integration, and implementation of cybersecurity and program protection sta...
Serves as a Field Office (FO) Information Security (INFOSEC) subject-matter-expert (SME), supporting all FO personnel with secure computing and digital management methodologies, working with the Chief Security Officer (CSO), Security Staff and other FO personnel as required to carry out a FO INFOSEC...
The primary responsibility of the Business Information Security Architect – Cyber Security is to serve as the primary point of contact between the information security function and the assigned business unit and/or Information Technologies department. Business Information Security. At least 4 years ...
Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Ensure information systems and network appliances are operated, maintained, and disposed of in accordance with security policies and practices. The Network and Computer Systems Administrat...
Evaluate Information Technology (IT) threats and vulnerabilities to determine whether additional safeguards are needed Develop and maintain a formal Information Systems Security Program. Perform analysis of network security, based upon RMF JSIG, National Industrial Security Program Operating Manual ...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technol...