Determine information security requirements by evaluating organization business strategies and requirements, researching information security standards; conducting system security and vulnerability analysis and risk assessments, assessing industry architectures/platforms and relative security benefi...
Knowledge of systems lifecycle management principles, including software security and usability; skill in determining how a security system should work (including its resilience and dependability capabilities) and how changes in conditions, operations, or the environment will affect these outcomes. ...
Determine information security requirements by evaluating organization business strategies and requirements, researching information security standards; conducting system security and vulnerability analysis and risk assessments, assessing industry architectures/platforms and relative security benefi...
MINIMUM QUALIFICATIONS US Citizen TS/SCI Clearance Minimum BA or BS degree in Information Technology or related field IAM Level II and required CE certifications Five years experience in DoD Cybersecurity operations Expert understanding of NIST, DoD, & Army Cybersecurity & Risk Management Framework ...
MINIMUM QUALIFICATIONS US Citizen TS/SCI Clearance Minimum BA or BS degree in Information Technology or related field IAM Level II and required CE certifications Five years experience in DoD Cybersecurity operations Expert understanding of NIST, DoD, & Army Cybersecurity & Risk Management Framework ...
MINIMUM QUALIFICATIONS US Citizen TS/SCI Clearance Minimum BA or BS degree in Information Technology or related field IAM Level II and required CE certifications Five years experience in DoD Cybersecurity operations Expert understanding of NIST, DoD, & Army Cybersecurity & Risk Management Framework ...
Determine information security requirements by evaluating organization business strategies and requirements, researching information security standards; conducting system security and vulnerability analysis and risk assessments, assessing industry architectures/platforms and relative security benefi...
Determine information security requirements by evaluating organization business strategies and requirements, researching information security standards; conducting system security and vulnerability analysis and risk assessments, assessing industry architectures/platforms and relative security benefi...
We are currently recruiting for the Deputy Director of Information Technology who will be responsible for leading a highly technical and talented IT team which supports a multitude of federal, state, and local agencies/customers to include six divisions specializing in security, construction, logist...
Develops and updates information governance policies including a written Firm-wide information governance policy, records retention schedule, and information classification and security policy. Collaborates with Information Systems/Technology colleagues (especially Digital Collaboration, Security, P...
We are currently recruiting for the Deputy Director of Information Technology who will be responsible for leading a highly technical and talented IT team which supports a multitude of federal, state, and local agencies/customers to include six divisions specializing in security, construction, logist...
Information Security - Vulnerability Solutions Support. Bachelor’s degree technology, information security or related field or the equivalent combination of experience and certifications. The Senior Manager, Vulnerability Management, Solutions Support functions as an individual technical expert as p...
We are currently recruiting for the Deputy Director of Information Technology who will be responsible for leading a highly technical and talented IT team which supports a multitude of federal, state, and local agencies/customers to include six divisions specializing in security, construction, logist...
Acts as the Safety and Security Director in the absence of the Safety and Security Director. Skill in operating a personal computer utilizing a variety of software applications including Microsoft Word, Access, Excel, PowerPoint, e-mail, internet searches, and creating and interpreting graphs and ch...
Current information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM). Marriott Manager - Information Security - Vulnerability (Containers) Juneau , Alaska Apply Now. Evaluate...
The University of Alaska Southeast(UAS)invites qualified candidates to submit resumes for the position of Chief Information Officer (CIO). The CIO will also collaborate with the University of Alaska Chief IT Officer (CITO) within a shared services framework for certain identified services. As a seni...
City of Bethel Information Technology Director Bethel , Alaska Apply Now. The Information Technology Director is responsible for the overall planning, administration and maintenance of the Citys technology infrastructure and services. The Director plans and implements new technology solu...
The Remote Security Officer provides services for a variety of large and small business clients in remote settings where health, safety and security is our #1 priority. May check heating, lighting, sprinkling, security, ventilation, fire, etc. Must have at least three (3) years of full-time professi...
Job Description**SummaryThe Security Officer provides services for a variety of large and small business clients where health, safety, and security is our #1 priority. May check heating, lighting, sprinkling, security, ventilation, fire, etc. At least two (2) years of security, law enforcement or mi...
The Remote Security Officer provides services for a variety of large and small business clients in remote settings where health, safety and security is our #1 priority. May check heating, lighting, sprinkling, security, ventilation, fire, etc. Must have at least one (1) year of full-time professiona...
The IT Security Analyst’s role is to ensure the secure operation of the Maniilaq Association’s computer systems, servers, and network connections. Recommend, schedule (where appropriate), and apply fixes, security patches, disaster recovery procedures, and any other measures required in the event of...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Reports to the Lead Security GuardSupervisor. The Part-Time Security Guard is a vital member of the healthcareteam at Maniilaq Health Center Village Clinic. Within the first year, must obtainCPR, First Aid, and AED certificates as well as Unarmed Security Guard License,and complete Non-Violent Crisi...
Experience in one of the following requirements:• Two (2) years of service in the United States Armed Services (including Reserves or National Guard);• Any combination of two (2) years of experience in physical security (as a security officer, armed or unarmed) and service with the United States Arm...
Reports directly tothe Lead Security Guard. Responsibleto provide a safe and secure atmosphere for patients, staff, and visitors, asoutlined in Maniilaq Association policies and in the Hospital Security policiesand procedures manual. It is expectedthat the guard will not leave the hospital grounds a...