- UpvoteDownvoteShare Job
- Suggest Revision
Champion processes and technology as a subject matter expert in various areas of information security and to demonstrate this ability at a senior level. The position works closely with teams in other information technology and operational disciplines to provide superior protection to Red Roof assets.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities will include delivering a range of essential services such as cybersecurity incident detection, incident response, threat assessment, cyber intelligence, software security, and vulnerability assessments.
Full-timeExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform threat hunting, researching findings, validating that technical security controls have been implemented properly, audit analysis, vulnerability management, software assessment, monitoring network performance in real-time, incident response/clean up, and developing the POA&Ms for those items.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Associates or Bachelors in Computer Science, Network & Security, a related discipline, or equivalent experience, OSCP, OSCE, GPEN, GWAPT or other Cybersecurity certificates, or similar Experience in Information Technology (IT) Security, 4yrs.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Intrusion Response in the form of day-to-day network traffic analysis and threat assessment/impact analysis. · Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications Bachelor's degree in Computer Science, Information Technology, or Information Security CISSP, CEH, GIAC Certifications To review benefits, please click here jobs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and respond to real-time security events generated by varying network security technologies to discover potential threats to the enterprise, protection needs assessment and threat assessment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintains network device and information security incident, damage, and threat assessment programs. Requires a bachelor's degree in information technology, Computer Science, Mathematics, Statistics, Business Engineering or Physical Science and 10 years of general experience in any of the following areas: complex problem solving, software, systems, business processes, cyber security, network, hardware installation, network management, enterprise communications, information assurance, system administrator or data standardization.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Within Information Security, the Risk Assessment and Management Department (RAM) is responsible for assessing risks associated with 3rd party vendors systems, software, IoT devices, ICS, technology processes, or outsourcing arrangements handling, processing, or storing Federal Reserve data.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant work experience in Information Technology and Cybersecurity, including roles in SOC, Network/Security Engineering, Threat Intelligence, or similar domains. Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The security risk management position will focus on supporting security governance, risk and compliance (GRC) management activities such as information technology (IT) security, operational technology (OT) security and physical security risk assessment, vendor security risk assessments, mitigation/remediation governance, and administer security risk and governance platforms.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging advanced threat assessment technology and experience in building high-level information security infrastructure, we develop adaptive solutions uniquely tailored to our customers business objectives to protect sensitive data against sophisticated threats in an increasingly complex security environment.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee, evaluate, and support the documentation, validation, assessment, and authorization processes necessary to ensure that existing and new information technology systems meet the Department's cybersecurity and risk requirements, and provide decision makers with the knowledge to make well-informed risk decisions.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Seeking a Compliance Detection Lead with experience gathering data on information systems and device configurations, which is used for system identification, maintenance, cyber threat assessment and investigation, vulnerability detection, or system exploits and that understands DoD and Army Cybersecurity policies in support of U.S. Army Human Resources Command (HRC) at Fort Knox, Kentucky.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SOCPAC requires flexible services including, but may not be limited to, Contractor Owned, Contractor Operated (COCO) capabilities using air, surface, subsurface, space, and cyber platforms to meet mission needs in an ever-changing threat and technology landscape.
$176,000 - $282,000 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago
threat assessment information technology jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?