- UpvoteDownvoteShare Job
- Suggest Revision
As an Information System Security Manager (ISSM) for TCASS, your role is integral to the security and compliance of the organization's information systems, with a particular focus on Assured Compliance Assessment Solution (ACAS), the Risk Management Framework (RMF), and Security Technical Implementation Guide (STIG) tracking.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager is a member of the IT leadership team and will lead information security, cybersecurity, and IT risk management programs based on industry-accepted information security and risk management frameworks.
ExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Under the direct supervision of the Information Security Manager, the Senior Information Security Analyst assists the Organization with understanding, applying, and implementing information security and privacy standards.
$44.64 - $52.45 an hourExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will provide a qualified individual(s) to serve as an Information Systems Security Officer (ISSO) providing cyber security oversight for several major OPR applications and general support systems as assigned by the Government Information Systems Security Manager.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP) are preferred.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The InfoSec Third Party Risk Manager manages, plans, and assesses oversight of information security controls. 7+ years experience working in and/or managing Information Security Governance, Risk, and Compliance functions.
$144,000 - $168,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist the Information Systems Security Manager (ISSM) and provide multi-discipline expertise covering project management, system security engineering, system administration, and network administration.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity specific certifications such as CISSP (Certified Information Systems Security Professional and/or CISM (Certified Information Security Manager) preferred.
$110,000 - $125,000 a yearExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Tesla is seeking an experienced program manager to lead the IT Internal Audit plan in the complex areas of Information Security, Data Privacy, System Development, and Technology Risk Management.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM) The IT and InfoSec Operational Risk Officer within the second line of defense Operational Risk organization is responsible for the independent oversight of front-line Information Technology (IT) and Information Security (IS) units to socialize risk concepts, frameworks and promote the organizations' risk culture, including education and training.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Microsoft Certified: Azure Fundamentals - Certified Cloud Security Professional (CCSP) - Certified Information Systems Security Professional (CISSP) - Certified Information Security Manager (CISM) - Certified Information Systems Auditor (CISA) - Certified in the Governance of Enterprise IT (CGEIT) - Certified in Risk and Information Systems Control (CRISC) - Network+ Certified Professional.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our core competencies are (1) Systems Engineering & Integration Services; (2) Information Technology Services; (3) Information Assurance & Cyber Security Services; (4) Cloud Services; (5) Business Services and (6) Products.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performs Assessment and Authorization (A&A) activities such as information system certification testing of required configuration controls and preparing/maintaining various documentation such as: Standard Operating Procedures (SOP), System Security Plan (SSP), Risk Assessment Report (RAR), Security Controls Traceability Matrix (SCTM), etc.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Using the mapping and networking above, M/USGE will be responsible for collecting, collating, and sharing information related to business opportunities and market intelligence emanating from U.S. Congress, DoD, and other federal government stakeholders, with the goal of identifying or creating new opportunities, and identifying and mitigating risk to current programs.
Full-timeExpandApply NowActive JobUpdated 3 months ago
information security manager risk jobs
FEATURED BLOG POSTS
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.