- UpvoteDownvoteShare Job
- Suggest Revision
State of Michigan - Cyber Security (MCS) - IT Security Architect. IT Security Architect 2 - Job Description. High level of knowledge with various compliance frameworks, such as FISMA, FedRAMP, Pub 1075, PCI-DSS, etc.
Full-timeExpandUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyzes and reviews IT and physical security events, and traffic flows escalated from automated detection systems utilizing commercial Security Incident and Event Management (SIEM [Tripwire software]), Intrusion Detection and Prevention Systems (IDS/IPS [Palo Alto, Cisco ASA, McAfee, Ironport software]) and log management and database activity monitoring.
ExpandUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
STA I.T is actively seeking a IT Security Architect foran immediate contract engagement with our government client. Proficient in various compliance frameworks such as FISMA, FedRAMP, Pub 1075, PCI-DSS, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Contractor shall identify the ISSO position, as key personnel, to be the Designated Person(s) assigned to one or more existing FISMA Systems of Record as well as new IT Systems that are slated as new work products to develop an Authority to Operate (ATO) and follow-on Continuous Monitored system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ISSO will report to a Designated Information System Security Manager (ISSM) and the Director of Security. Due to the importance of keeping system(s) updated to meet FISMA guidelines, while supporting DHS/CISA directives around limiting vulnerabilities, the ISSO role is of upmost importance throughout its lifecycle.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
It is essential that the individual have an understanding of privacy and security regulations as they apply to FERPA, HIPAA, FISMA, and PCI-DDS. Development of security and privacy policies (in conjunction with IT governance and other policy development groups) that embody industry best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist with the architecture, configuration, deployment and service design of network and system security monitoring and analysis tools, Identity and Access Management platforms, IT-GRC platforms.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Infrastructure and Enterprise Security Engineering team plan, architect, engineer, and propose new and/or improved infrastructure and systems architecture to meet the current and future needs of the NCSC. They will Identify opportunities and transition services to cloud service providers and maintain and augment the IT systems operations that support the NCSC's FISMA High IT infrastructure on a 24/7 on call basis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintain security standards of the information systems by monitoring the IT environment; identifying security and operational gaps; evaluating and implementing enhancements. Possess one or more of the following technical certifications: ISC2 Certified Information Systems Security Professional (CISSP); ISC2 Information Systems Security Architecture Professional (ISSAP) - highly desirable; ISC2 Certified Cloud Security Professional (CCSP); GIAC Security Leadership Certification (GSLC); Cisco Certified Architect (CCAr); Cisco Certified Design Expert (CCDE); Cisco Certified Internetwork Expert (CCIE) Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have awareness and knowledge of federal directives, FISMA, Certification & Accreditation (C&A) processes, System Assessment & Authorization (SA&A) processes, FEDRamp, Security-related NIST controls and standards.
$175,000 - $185,000Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a Supervisor for our Governance, Risk, and Compliance (GRC) section to provide vision, direction, and leadership for cybersecurity oversight and maintenance of Federal Information Systems Management Act (FISMA) compliant security programs supervise a team of cybersecurity analysts in a matrix organization partnering with cyber architecture & engineering, cyber hunt & incident response, and operational cyber research.
ExpandUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications: You have experience or an interest in working with regulated computing environments such as FISMA and/or FedRAMP and are enthusiastic about doing it better. Kubernetes certifications or an interest in obtaining these certifications are a plus, such as those from the Cloud Native Computing Foundation; Certified Kubernetes Administrator (CKA), Certified Kubernetes Application Developer (CKAD), or Certified Kubernetes Security Specialist (CKS.
$146,400 - $201,300 a yearRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You have experience or an interest in working with regulated computing environments such as FISMA and/or FedRAMP and are enthusiastic about doing it better. Knowledge of standard methodologies related to security, performance, and disaster recovery.
$146,400 - $201,300 a yearRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Comprehensive understanding of regulatory compliance standards relevant to the IT industry, particularly those impacting federal agencies, such as the Federal Information Security Management Act (FISMA), National Institute of Standards and Technology (NIST) frameworks, and General Data Protection Regulation (GDPR) for international considerations.
Full-timeRemoteExpandUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate knowledge in federal security assessments of IT solutions and continuous monitoring strategies following FISMA, NIST and other federal guidelines. Experience with Risk Management Framework (RMF) and/or federal security assessments following FISMA guidelines.
ExpandApply NowActive JobUpdated Today
fisma it security jobs
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.