- UpvoteDownvoteShare Job
- Suggest Revision
Have the ability to communicate and add value to IT Infrastructure, Security, Network Architectural Design, IT Security & Compliance. Have good knowledge of Firewall, Network, IT Compliance, and Project Management.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of IT security principals, technologies, best practices to include logical access control, PKI and other encryption methods, network-based and host-based IDS/IPS, security configuration baselines, auditing, vulnerability discovery, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Tampa FL Jobs, Lead Vulnerability Management Engineer, Vulnerability Management, Cybersecurity, Rapid 7, Qualys, Tenable, Kenna, NorthStar, Brinqa, Public Cloud, CISSP, CISM, CRISC, Security Risk Management, Florida Recruiters, IT Jobs, Florida RecruitingLooking to hire for similar positions in Tampa, FL or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, Telecommunications and Network Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Five or more years of experience in business process controls and IT risk management, internal audit, IT security, or other IT compliance related work. Our Risk Advisory Services Technology Risk Consulting (TRC) Managers serve complex global clients aspiring to help transform their IT risk management and assurance capabilities to be aligned to the key risks and strategies of their organization.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos Defense has a dynamic opportunity for a Computer Network Defense (CND) Security Engineer to work at our customer site at the National Maritime Intelligence Center, Suitland, MD. In this role you will provide operations, engineering, technical and program management services to support cyber related requirements and operations.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Information Assurance Certifications (i.e., CISSP, CISA, GIAC, Security +, Certified Ethnical Hacker, etc.) The Cyber Security Engineer will support enhancements to system security architecture and cyber security capabilities and manage multiple system security plans for development, test and production systems to support Assessment and Authorization (A&A) security requirements.
$122,200 - $220,900 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Must have one of the following certifications: CompTIA A+ CE, CCNA Security+, CND, CompTIA Network+ CE, SSCP. IT-Strat has supported multiple clients including the Department of Homeland Security (DHS), Customs and Border Protection (CBP) and Immigration and Customs Enforcement (ICE via both prime and meaningful subcontracts.
$150Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As the Sr. Information Security Engineer you will implement, maintain, and enforce data security standards, processes and initiatives. The Sr. Information Security Engineer is responsible for the complex design and implementation of organization security components to ensure that information, (Regulatory and Private) is secure from unauthorized access, protected from inappropriate alteration, physically secure, available to authorized users in a timely fashion, and monitored for incidents, breaches, and other anomalies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will collaborate closely with business and IT executives across our brands to assess security risks and play a significant leadership role in developing, enabling, and advancing Information Security Governance, Risk & Compliance (GRC) processes and capabilities across PVH brands and business units.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Create security incident communications on behalf of the IT Operations Manager for distribution to IT Management and external business customers. The IT Security Analyst will also work in tandem with IT Operations engineers and management as required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Associates within TRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, and risk management professionals. At least 5 years of experience working in information security, information technology or risk management.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As part of the second line of defense, it is critical to foster strong working relationships with other leaders in the Lines of Business, Cyber and Technology organizations, and other risk management offices to perform and support evaluations of the firms risk posture and offer independent advice and recommendations regarding ways to reduce risks.
$233,100 a yearExpandApply NowActive JobUpdated Today
network security it engineer information risk management jobs Title: engineer security Company: Connectbase
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.