- UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Engineer (Vulnerability Management Specialist/Engineer), your responsibilities include assessing risk and running continuous vulnerability monitoring of the environment, including segments requiring FedRAMP compliance.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Skydance Information Security Director is responsible for shaping company policy, advising IT Executive Staff on current and potential threats, monitoring and maintaining a proactive security posture, and rigorous testing and risk management.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At the direction of the CISO, help implement, and monitor a strategic, comprehensive enterprise information security and risk management program. Demonstrated understanding of technological trends and developments in the areas of information security, risk management, web architectures, and cloud computing.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Familiar with Defense Security Service (DSS) Risk Management Framework (RMF), Security Technical Implementation Guides (STIGs), and Security Content Automation Protocol (SCAP) Tool.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional certification preferred (e.g. Certified Information Systems Auditor CISA, Certified Information Systems Security Professional CISSP, Certified Information Security Manager CISM, Certified in Data Protection CDP, Certified Information Privacy Professional CIPP, Certified Information Privacy Manager CIPM, Certified Information Privacy Technologist CIPT, Data Governance and Stewardship Professional DGSP, Certified Data Management Professional CDMP.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The position will be located at Wright-Patterson Air Force Base. The candidate would be undertaking the development and delivery of documentation, reports, technical data and other product deliverables necessary to support system security analysis and certification analysis in the management, modification and acquiring ground stations and platforms supported by the Tanker Recap/NGAS program.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Support the development, management, and maintenance of cybersecurity solutions (e.g. Host Based Security System (HBSS), Assured Compliance Assessment Solution (ACAS), Vulnerability Remediation Asset Manager (VRAM), Public Key Infrastructure/Enabling (PKI/PKE), Security Information and Event Management (SIEM), Anti-virus, Data-at-Rest Encryption.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Senior Information Security Analyst , you will be responsible for vulnerability management, performing NIST based risk and maturity assessments, incident response planning, and delivering security awareness training.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of information security management frameworks, such as International Organization for Standardization (ISO) 2700x, COBIT, National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), and Center for Internet Security (CIS) Critical Security Controls (CSC.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Engineer - Identity & Access Management. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Ethical Hacker (CEH), SANS certification(s), or Web Application Penetration Tester (WAPT) certification, Certification Identity and Access Manager (CIAM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience configuring and managing a Security Information and Event Management (SIEM) platform preferred. Gather and analyze performance and compliance data/metrics relating to the Bank's information security and information risk management standards.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Manager, you will support the Enterprise Risk Director / Chief Information Security Officer in enhancing the Enterprise Risk Framework entailing bank-wide policies and procedures to assist in an enterprise-wide risk management culture.
ExpandApply NowActive JobUpdated Yesterday
security management information jobs
FEATURED BLOG POSTS
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.