- UpvoteDownvoteShare Job
- Suggest Revision
Familiarity in IT and security domains (Identity and Access Management, Configuration Management, Vulnerability Management, Incident Management, etc.) - Experience with security assessment tools, including Nessus, Accunetix, Metasploit, or Cobalt Strike.
$112,860 - $186,200 a yearFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Intermediate knowledge of Information Security concepts, principles, and practices, including but not limited to threat management, SIEM, and incident response. Basic administration and management of security operations solutions and programs, such as our database security program, PKI and SIEM management.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of the following areas of technical expertise: information policy formulation, information security management, business risk management, IT risk assessment and management, IT continuity management, IT governance formulation, organizational change management, IT financial management, and IT auditAbility to manage with influence and communicate effectively with diverse audiences and executive teamsWolters Kluwer is a global leader in professional information services.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications QUALIFICATIONS Previous Contract Security, facilities management, military or law enforcement experience Outstanding interpersonal and communications skills required. Description SUMMARYStrategic Security (SSC) is a nationwide leading provider of security guard services, executive protection, bomb dog, intelligence, consulting, investigative services.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assists with management of DoD SAPF and SCIF environments based on experience and knowledge of implementing a multi-disciplined security program (access control, personnel security, physical security, OPSEC, COMSEC, etc.
ExpandUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must possess practical knowledge of USCG regulatory authorities: SAR Mission Coordinator, Captain of the Port, Federal On- Scene Coordinator, and Federal Maritime Security Coordinator. The Emergency & Disaster Management School Instructor provides instructional services to meet the Coast Guard's unique needs in support of online training, virtual training, and exportable training courses.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
MELE’s services include national security, intelligence, law enforcement and emergency response training, IT/cybersecurity, facility management and engineering, CBRNE defense and nuclear security, and mission and program support.
Full-timeExpandUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in providing IT Infrastructure and security-related tasks for Chief Information Security Officer (CISO) or Information Systems Security Officer (ISSO). Federal customer experience supporting HHS, preferably NIH. IT Project and Portfolio Management Experience Experience Implementing and overseeing end-to-end IT Service Management Project Management Professional (PMP) certification.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience with Windows and Linux ServersExceptional written and oral communication skillsExceptional organizational and analytical skillsCertifications such as Certified Information Systems Security Professional (CISSP) Certification, Security Essentials Certification (GSEC), Certified Intrusion Analyst (GCIA), Certified Incident Handler (GCIH), Certified Ethical Hacker (CEH), Certified Penetration Tester (CWAPT) BenefitsRate : $68 - $73.
ExpandUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, implement and manage Identity and Access Management (IAM), Identity Governance and Administration (IGA), Role-Based Access Control (RBAC) and Privileged Access Management (PAM) solutions to ensure secure and efficient user and client access to applications, systems, and environments.
$109,359 - $150,368 a yearExpandUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We’re excited for a Senior Cloud Security Analyst to join our high-energy Vulnerability Management team – to help shape the future of Vanguard’s attack surface management. What it Takes:Minimum of 5 years related work experience required, including experience with cloud security engineering, cloud vulnerability management, or general cloud cyber security.
Full-timeExpandUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Works with highly matrixed team of IS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DoD-approved 8570 Certification for IAT-II, which includes any of the following: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, and SSCP. Experience with CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, and CCSP.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Office of the Comptroller’s is seeking a Chief Information Security Officer (CISO) who will lead in the implementation and management of information security controls that will increase the Agency’s overall information security posture.
$150,000 - $160,000Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
If you have a deep background in cloud security engineering, cloud pen testing, or cloud vulnerability management - and you’re ready to challenge yourself and to grow - this role is for you.
Full-timeExpandApply NowActive JobUpdated 6 days ago
security management jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: