- UpvoteDownvoteShare Job
- Suggest Revision
As an Information System Security Manager (ISSM) for TCASS, your role is integral to the security and compliance of the organization's information systems, with a particular focus on Assured Compliance Assessment Solution (ACAS), the Risk Management Framework (RMF), and Security Technical Implementation Guide (STIG) tracking.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager is a member of the IT leadership team and will lead information security, cybersecurity, and IT risk management programs based on industry-accepted information security and risk management frameworks.
ExpandApply NowActive JobUpdated 21 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experienced with Software Development Lifecycle (SDLC) and related terminology as it relates to Information Security/Information Assurance on the cloud. Bachelor's degree, or CCSP (Certified Cloud Security Professional) or CEH (Certified Ethical Hacker) or CFR (CyberSec First Responder) or Cloud+ or CySA+ (CompTIA Cybersecurity Analyst) or GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber Security Professional) or PenTest.
$135,500 - $212,800 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The role includes security responsibilities as both an Information System Manager (ISM) to manage the corporate CP cybersecurity program and as a Facility Security Officer (FSO). The CSM is responsible for maintaining and continuously maturing CP's Information Security program, ensuring information is managed in a compliant and secure manner throughout its lifecycle.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Assist the Chief Information Security Officer in preparing to review with security contractor Security Assessments and Accreditation (SA&A) of USADF Information Systems.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Under the direct supervision of the Information Security Manager, the Senior Information Security Analyst assists the Organization with understanding, applying, and implementing information security and privacy standards.
$44.64 - $52.45 an hourExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Understanding of multiple Information Security domains, such as Identity & Access Management, Infrastructure Vulnerability Management, Network Security, Data Loss Prevention, End User Security, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Administration experience on Microsoft Enterprise CA – Cert Requests/MonitoringAdministration experience on Microsoft Active Directory Federation Services (ADFS)Familiarity with Information Assurance programs is a plusMicrosoft PowerShell Scripting for Server/Platform managementAny of the following: Cisco Certified Network Associate (CCNA), CompTIA Advanced Security Practitioner (CASP), (ISC)² Certified Information Systems Security Professional (CISSP.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
GSOC takes both physical and cyber security very seriously so candidates must be willing to work on-site in a high security environment. Requiring high level of experience in Information Technology Infrastructure Library (ITIL) process workflows and business analysis, this position will develop and process documentation related to GSOC and/or ITIL processes.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Previous Experience with several technical security disciplines such as System Information Event Management systems (SIEM), vulnerability management or security hardening (Required.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
CPSO must review,verify, edit, draft, and submit security paperwork to accredit facilities andAutomated Information Systems (AIS) in accordance with applicable policies. They will conduct orsupport the periodic security inspections of cleared facilities to ensurecompliance with the Technical Specifications for Construction and Management ofSAP Sensitive Compartmented Information Facilities, National IndustrialSecurity Programs Operating Manual (NISPOM), the NISPOM supplemental, and-anyunique requirements of various classified programs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Strictly adheres to U.S. DoD policies, National Advisory Group (NAG) 14C and 18A Doctrines, National Security Telecommunications and Information Systems Security Instruction (NSTISSI) 4000 Series, National Security Agency (NSA) COMSEC policies, and Combatant Command (COCOM) Memorandum of Agreements (MOAs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
ACTS-Aviation Security Inc. has an immediate opening for an Airport Security Guard at the Charlotte Douglas International Airport in Charlotte, North Carolina. Must be able to pass a Security Threat Assessment as administered by the Transportation Security Administration.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
ICI Services’ engineers, analysts, logisticians, technicians and information technology specialists provide integral, quality support to multiple US Navy organizations and the Department of Homeland Security.
$50,000 - $80,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
This individual will collaborate with the cyber security team to maintain computer and information security incident, damage and threat assessment programs. The candidate will investigate computer and information security incidents to determine extent of compromise to information and automated information systems, network assessments, researching and maintaining proficiency in tools, techniques, countermeasures, and trends in computer network vulnerabilities, data hiding and network security and encryption.
Full-timeExpandApply NowActive JobUpdated Yesterday
information security jobs Title: scrum master Company: Feed 8
FEATURED BLOG POSTS
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.