- UpvoteDownvoteShare Job
- Suggest Revision
Support Personal Security Vulnerability Assessment (PSVAs), High Risk Personnel (HRP) Packages, Daily Update Brief (DUB) briefs and mission records. The Strategic Threat Planner Analyst shall support the strategic vision of the government customer and manage the program operational needs and coordination on a day-to-day basis.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
KMI is a Minority Business Enterprise (MBE) and Small Disadvantage Business (SDB) that specializes in Logistics, Warehouse Services, Distance Learning/Training, Enterprise Solutions, Financial Management Support, Program Management, Intelligence Analysis & Threat Assessment, and Data Analytics/Operations Research.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with stakeholders, executives, and LOB partners to complete assessments, develop cybersecurity maturity recommendations across cybersecurity domains (governance & risk management, strategy and program management, vulnerability management, threat intelligence, security monitoring, network protection, identity and access management, business continuity / disaster recovery, incident response, security architecture, and cloud security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The top candidate will be subject to a minimum 10 year criminal background check and security threat assessment. In addition, the City will not discriminate in employment decisions on the basis of an individual's AIDS , AIDS Related Complex, or HIV status; nor will the City discriminate against individuals who are perceived to be at risk of HIV infection, or who associate with individuals who are believed to be at risk.
$25.4 - $30.1Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of three years demonstrated case management experience in threat assessment, violence risk assessment, and/or managing response to high-risk cases or crisis situations in a university or higher education setting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security principles, i.e., risk assessment and management, threat and vulnerability management, incident response, and identity and access management. Risk and Control Assessment, implement or coordinate remediation required by audits, and document exceptions as necessary, perform system and application vulnerability testing, participate in enterprise testing and assessment activities.
$90,263 - $157,959 a yearFull-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience in cybersecurity activities such as security risk management, requirements elicitation, requirements gap analysis, risk assessment, threat modling, penetration testing, static code analysis, CVE analysis, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Risk Management Framework, NIST standards, and cybersecurity assessment tools like ACAS and DISA STIGs∯*∯ Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cybersecurity risk management, disaster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
$75,600 - $172,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Excellent knowledge and experience with risk assessment, threat detection, SIEM, SAAS security, endpoint protection, and malware analysis. Risk Assessment - Internal and third party.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
May also support the supplier risk management lifecycle throughout all phases, and insider threat/risk programs. Produces risk assessment reports and remediation recommendations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience and training in threat assessment, investigations, risk management and counter- terrorism. Prepare operational and situational reports to assist in security deployment planning and risk mitigation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber risk assessment activities including threat modeling, vulnerability analysis and analysis of mitigation solutions. Support coordination of cyber risk assessments and Cyber Table Top (CTT) reviews.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
OurStaff Psychologist Benefits Stone, McElroy, & Associates/Psychological Dimensions/COPPS offers: Opportunities to develop a new skill set in police and public safety psychology and state-of-the-art risk/threat assessment.
RemoteExpandApply NowActive JobUpdated Today
threat assessment risk jobs
FEATURED BLOG POSTS
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.
How to Re-apply for Your Old Job Professionally
Have you recently started a new job only to find that you miss your old one? Maybe you didn’t realize how good you had it, and now you regret leaving. Don’t worry. You’re not the first person to feel this way, and you might even be able to return to your old job if you play your cards right.