- UpvoteDownvoteShare Job
- Suggest Revision
Independently develop and maintain system security documentation, including drafting, reviewing, editing and recommending guidance for Standard Operating Procedures (SOP), Tactics, Techniques, & Procedures (TTP), Plan of Action and Milestones (POA&M) and Federal Information Security Management Act (FISMA) Score Card.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
IT Operations Management: Overall IT Operations Management, Service Level Management, Resource Management, Processes & Standards Implementation, Compliance Management, Incident Management, Financial Management, Technical Management, Information Security Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will be knowledgeable in a variety of operating systems such as: Windows 11, Microsoft Server, Red Hat Enterprise Linux, and Photon OS. The candidate will also need a thorough understanding of Enterprise Information System Topologies and concepts, such as: automation, virtualization, network configuration, network services, authentication system management, system design concepts, event monitoring and analysis, Virtual Desktop Infrastructure (VDI) and incident response.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Analyst team operates as part of Infrastructure Risk Management (IRM), a department within Global Technology and Operations that is responsible for an enterprise-wide integrated infrastructure risk management program which employs a holistic approach to manage cybersecurity, information security, data privacy, physical security and business continuity led by the Chief Security Officer.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience of intrusion analysis, digital forensics, incident response, and incident management. Develop secure solutions for enterprise, enclave, and local-level information systems.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Operations and Architecture function includes the Security Incident Response, Vulnerability Management, and Information Security Architecture teams.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Skilled in: Applications/systems development methodologies Change management Configuration management Cyber Security Database design tools and techniques Disaster Recovery Enterprise/information architecture High Performance Computing Incident/problem management IT Monitoring & Reporting Network communications technologies Network design, connectivity and capacity configuration Operating systems Project management tools and techniques Web Services.
$151,962.7 - $167,070 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Participate in the integration and management of enterprise security systems (e.g., Firewalls, VPN, SIEM, MFA), security threats and related risks, end-point malware protection, asset management, pen-testing, vulnerability management, access management, configuration management, encryption techniques, and cloud security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Our services include program management, enterprise performance management, enterprise architecture, implementation of emerging capabilities and requirements, life cycle management, operations & maintenance, enterprise data management, service desk support and IT training.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applies cybersecurity principles and practices, including information security, incident response, and risk management. Peraton requires a Storage and Database Architect to support the Special Operation Command Information Technology Enterprise Contract (SITEC.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (Ex. Cyber Incident Response Team, Data Loss Protection, Cyber Threat Operations Center and Digital Forensics) along with other Truist investigatory units (Ex. Human Resources, Legal, Corporate Security, Ethics, Corporate Investigations) and liability risk officers and technology management to guide EITP investigations and activities.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead vulnerability management incident response activities for zero-day vulnerability events. Lead Information Security Engineer - RSA. Lead Vulnerability Scanning Information Security Engineer.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Serve as the liaison between the contract and the government for all Information Security endeavors to include Risk Management Framework Assessment and Authorization tasks, Continuous Monitoring, and government IT connection and application issues.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cybersecurity Architect will provide expert level strategic planning to develop technical solutions , provide techn i cal guid ance and assist ance , perform review and development of cybersecurity relevant policies ; all with an "enterprise view" and in conjunction with support provided by a team of Cybersecurity Architects and Senior Systems Engineers working under a major Federal government contract, supporting both classified and unclassified information systems and networks.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Practical experience with an enterprise incident management system. Incident and problem management. Configure and troubleshoot issues related to the following technologies: Windows Server, Active Directory, Windows and Mac OS, laptop and desktop hardware, Anti-Virus, Email Security, and Microsoft 365 Applications.
ExpandApply NowActive JobUpdated Today
incident management enterprise information security jobs
FEATURED BLOG POSTS
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.