- UpvoteDownvoteShare Job
- Suggest Revision
The security risk management position will focus on supporting security governance, risk and compliance (GRC) management activities such as information technology (IT) security, operational technology (OT) security and physical security risk assessment, vendor security risk assessments, mitigation/remediation governance, and administer security risk and governance platforms.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
ResponsibilitiesVice President, Threat Management & ResponseJob Description:Humana is a Fortune 50 market leader in integrated healthcare whose dream is to help people a. has been recognized as one of the fastest growing companies in North America by both Inc. Magazine (Inc. 5000) and Deloitte (Deloitte's Technology Fast 500) and CEO Chris Weiler was recognized as a.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybervance is a rapidly growing information security and information technology company in Washington, D.C. We are looking to hire a Senior Governance Policy SME for Insider Threat.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
U) Two years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
U) Fourteen years of IA System Architect and Engineer (IASAE) experience, to include recent experience within the last five years, with Defense–in–Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
National Institute for Smart Government (NISG) is a not-for-profit company set up in 2002 by the Government of India (GoI) on the Public-Private-Partnership (PPP) model with Secretary, Ministry of Electronics and Information Technology (MeitY) as its Chairman.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
U) Knowledge of Federal, NSA, IC, and DoD Information Security regulations, publications, and policy. (U) Twelve years of IASAE experience, to include, recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage the information security framework and governance based on standard risk management processes, including threat assessment and reporting in collaboration with the Technology & Transformation (D&T) team.
$144,391.64 - $180,489.83 a yearExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant work experience in Information Technology and Cybersecurity, including roles in SOC, Network/Security Engineering, Threat Intelligence, or similar domains. Whitepaper Authoring: Develop well-researched, insightful, and engaging whitepapers addressing various aspects of IT and cybersecurity, such as threat intelligence, incident response, risk assessment, and compliance.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Intrusion Response in the form of day-to-day network traffic analysis and threat assessment/impact analysis. Knowledge of how traffic flows across the network (e.g., Transmission Control Protocol [TCP] and Internet Protocol [IP], Open System Interconnection Model [OSI], Information Technology Infrastructure Library, current version [ITIL.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
SOCPAC requires flexible services including, but may not be limited to, Contractor Owned, Contractor Operated (COCO) capabilities using air, surface, subsurface, space, and cyber platforms to meet mission needs in an ever-changing threat and technology landscape.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Soft Tech Consulting, Inc. is a woman and minority-owned business headquartered in Chantilly, VA. With contracts in both the public and private sectors in the DC metro area and across the country, Soft Tech is an organization made up of highly successful and talented Information Technology professionals offering enterprise class solutions for any size organization at great value.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop plans and procedures for security incidents, threat assessment and threat hunting. Education: - Bachelor's degree in computer science, computer engineering, management information systems, information technology, or a similar field.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DescriptionHumana's Associate Vice President (AVP), Technology and Cybersecurity Risk works closely with all areas of Enterprise Information Protection (EIP), Internal Audit, Enterprise Risk Management, business units, regulator.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Performing threat hunting by actively seeking out anomalies and Indicators of Compromise and/or verifying their presence in the AB’s Information Technology Environment; The Information Security Analyst team operates as part of Infrastructure Risk Management (IRM), a department within Global Technology and Operations that is responsible for an enterprise-wide integrated infrastructure risk management program which employs a holistic approach to manage cybersecurity, information security, data privacy, physical security and business continuity led by the Chief Security Officer.
ExpandApply NowActive JobUpdated 14 days ago
threat assessment information technology jobs
FEATURED BLOG POSTS
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
10 Best Tips to Find a Job When Relocating
Are you planning to move? That’s great news, but now you might wonder what that means for your job. Some people are lucky – they can relocate and keep working the same position as always, just remotely. For others, however, this isn’t an option. They must search for and land a job in their soon-to-be new city. This can be intimidating, given that getting a new job even under normal circumstances can be challenging. Now you’ll have to overcome additional hurdles. This article provides valuable tips on how to find a job in another state. Because it can be done! Read on to learn how.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.
Looking for New Candidates?
Before the turn of the century, recruiters could put their "help wanted" ads in the newspaper, and applications would pour in. Since then, recruiting has turned a new page. The use of the internet and other technologies allows recruiters to broaden their candidate pool for the simple reason being
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.