- UpvoteDownvoteShare Job
- Suggest Revision
Additional Responsibilities for a Staff Program Cyber/SSE Lead:Working as a programmatic lead in a structured engineering environment, where the Cyber Lead may supervise and prioritize security requirements; identify driving requirements from Cyber Survivability/Resilience, Risk Management Framework (RMF), and/or System/Technical Requirements Document (SRD or TRD); and allocate Cyber/SSE requirements to segment/subsystem/component specifications.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Computer Science, Engineering, Network Security, or a related field with 10+ years of related industry experienceDemonstrated excellent technical writing skills and project/program management experience.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This position will support the BT Risk Manager in the management and administration of the Cyber/Risk Management program and Governance Risk and Compliance (GRC) processes and tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficient with evaluating sites under the Texas Commission on Environmental Quality (TCEQ) Texas Risk Reduction Program (TRRP) and/or the Petroleum Storage Tank (PST) Program. The Environmental Project Manager is a key role responsible for coordinating drilling, sample/data collection, subcontractor tasks, evaluating data, and compiling written reports for submittal to clients and regulatory agencies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Manager role sits within the Cyber Governance and Risk (G&R) organization supporting our enterprise Cyber Assessment Maturity Program (CAMP). New York City (Hybrid On-Site): $199,100 - $227,200 for Sr. Manager, Cyber Risk & Analysis.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience with Risk Management Framework (RMF) process, eMASS, ACAS, SCAP, STIG, Cyber Risk Assessments (CRA), Cyber Table top (CTT) or related process. Interface with the Information System Security Manager (ISSM), program managers, system stakeholders, and external contractors to coordinate cybersecurity requirements and architecture flow down from the system level to individual elements of the system.
$108,700.8 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certifications related to or pursuing certification related to Cloud, Cyber or Technology Operations, such as Cloud provider certifications, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking an energetic, self-motivated Cyber Risk Auditor (Experienced Senior) with experience evaluating and analyzing technology and cybersecurity risks interested in becoming part of our Tech Audit team.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
ASG has a challenging career opportunity for a Program Manager/Lead Cyber Security Specialist overseeing program management, web development, and information systems security.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a primary IAM and IGA leader, the selected candidate will partner with enterprise architecture, engineering, operations and program teams to ensure that the PAM and IGA strategies and roadmaps are in alignment with other IAM capabilities and towers of work.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Code-extrefer TKO provides systems engineering, software development, data science and cloud development and engineering services to the Cyber Infrastructure Solutions customer.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional desired qualifications include Certified Ethical Hacker (Master) or Certified Enterprise Risk Professional (CEH/ CERP) and Project Management Professional (PMP). JT4, LLC provides engineering and technical support to multiple western test ranges for the U.S. Air Force, Space Force, and Navy under the Joint Range Technical Services Contract, better known as J-Tech II. JT4 develops and maintains realistic, integrated test and training environments and prepare our nation's war-fighting aircraft, weapons systems, and aircrews for today's missions and tomorrow's global challenges.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leverage big data in support of an enterprise scale Medical Device Cybersecurity program spanning Risk Management, Cyber Digital Transformation, Threat Management, Network Security, End Point Security, IT Controls, Security Operations and Identity and Data Management.
ExpandApply NowActive JobUpdated Yesterday
software engineering program manager cyber risk jobs Title: project manager
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.