- UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Analyst provides team and project leadership for the Configuration and Vulnerability Management team in Infrastructure and Operations. The Information Security Analyst is responsible for administering vulnerability scanning and leading and executing various projects and initiatives relating to vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Specialist II supports the operation of the information security management system that defends mission critical information and 24x7 systems at all Almac sites.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with the University Security, Policy, and Networking groups to improve and share information security practices. Provides advanced level of information security technical and practical consulting; makes recommendations on appropriate strategic security actions; performs digital forensic investigations as appropriate.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the direction of the Manager, Information Security Operations, the Engineer III Security Analyst will use subject matter expertise to give guidance, best practices, and support to business and technology stakeholders during the deployment of critical business and technology initiatives.
$65 - $86.12 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will excel in this role if you are:You are familiar with the DOD Risk Management Framework (RMF) and DISA STIGs∯*∯ Have experience with ACAS/Nessus Security Scanner. Expertise required with one of the following: Security Content Automation Protocol (SCAP) Scanner or ACAS/Nessus Security Scanner.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The JSP Senior System Security Information Assurance (IA) SME shall serve as the knowledge expert of all security related aspects of the Facilities Service Directorate (FSD) Industrical Control System (ICS) Network Supervisory Control and Data Acquisition (SCADA) computing environment.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Manage Information Security Operations and Engineering programs, including endpoint management, anti-malware, remote-access, DLP, logging and analysis, and firewall change reviews, security awareness training, ensuring successful program execution and sustainment of appropriate control environment.
$145,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position Title: Deputy – Chief Information Security Officer. Deputy – Chief Information Security Officer. This may include experience in roles such as security analyst, security engineer, security architect, or security manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role is critical to support OnePlan of maturing security processes and posture at OneTrust within the information security GRC domain. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Security Analyst II is responsible for the design, configuration, testing, and deployment of on-prem and cloud services. Minimum of 4 years’ experience working as a security analyst.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Plan, and Security Assessment Plan, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for leading and performing the activities necessary to maintain the security of systems developed and maintained, as well as the security of information within those systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM), Certified Information System Security Professional or Associate (CISSP), Global Information Assurance Security Leadership, or Certified Chief Information Security Officer (C|CISO) Certification.
$75,600 - $172,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The analyst will provide documentation detailing any additional information collected and maintained for each security investigation. Non-traditional device feeds will deliver data to the SIEM architecture (e.g., Human Resources (HR) data, badging information, and physical security devices, etc.
Full-timeExpandApply NowActive JobUpdated Today
Title: information security analyst Company: California Independent System
FEATURED BLOG POSTS
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.