- UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
$200Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, cyber threat intel, vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Authorizations Manager will report to the Chief Information Security Officer (CISO), and will work with the Cyber Operations Manager, the Network Operations Center, Contractor Assurance and other business functional managers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
RCAs are responsible for providing advisory support concerning computer (network and infrastructure) analysis to enable Adversarial Cyber and/or Electronic Warfare Operations to support an evolving DoD Red Team. Additionally, RCAs act as subject matter experts on variety of complex topics related to varied cyber threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes but is not limited to Network Monitoring, Preventative and Detection Controls, Forensics and Investigations, Security Awareness, Security Vulnerability Management, and Cyber Threat Intelligence activities.
$250ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
DLC is seeking candidates for the role of Information Security Engineer I on the Cybersecurity Operations (“Cyber Ops”) team, directly supporting NERC CIP requirements and critical infrastructure security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Apply knowledge of cloud security basics to administer, monitor, and secure cloud infrastructure across platforms such as Azure and AWS.Coordinate and support Zscaler technologies, ensuring secure and efficient traffic routing and protection against cyber threats.
$101,000 - $120,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification(s) in one or more of the following areas: GIAC Certified Incident Handler (GCIH), Certified Information Systems Security Professional (CISSP), CISA: Certified Information Security Auditor, CEH: Certified Ethical Hacker, CISM: Certified Information Security Manager, or CompTIA Security.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree must be in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, or Software Engineering) with 5-7 years of experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud software, infrastructure, network security hardware / software, - You will focus on driving adoption and efficient use of the source-to-pay process through system optimization and proactive partner outreach along with sourcing management, contract management, and negotiation support where applicable.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Enterprise Technology Audit Group - Information Security Audit Team is looking to fill a Senior Audit Manager position to support the coverage of Wells Fargo’s core Information Security and Cybersecurity controls (e.g., Cyber Threat Fusion Center, Data Loss Protection, Security Information and Event Management, Cryptographic Services, Patch and Vulnerability Management, Network Security Management, Access Management, Third Party Information Security Management etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Seven+ years of network or security operational experience, including at least 2 years in a senior management/Director level position in an IT enterprise environment, or cyber security focused organization.
$150ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Data Security Procurement group, you will be responsible for establishing and executing sourcing strategies and plans for our Cyber Defense & Engineering + Information Technology department.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Operation Center Fusion team synthesizes multi-source security alerting, intrusion investigations, cyber intelligence, and business information into actionable analysis.
ExpandApply NowActive JobUpdated Yesterday
network support information security cyber jobs Title: information security engineer Company: Apogee Integration Llc
FEATURED BLOG POSTS
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.