- UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Cyber Security Manager, you will have an internal business focus on monitoring, and improving detection of security events across the organisation. Network security principles and protocols, SIEM tools, log analysis, incident investigation, cyber threat and vulnerability knowledge, security monitoring tools, analytical and problem-solving skills, communication and documentation abilities, intrusion detection and prevention systems (IDPS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate is an established cyber security Capture Manager who has experience winning Government Contract Research & Development (CRAD) programs. Candidates should be experienced in capturing and managing advanced technology development programs within the Department of Defense (DoD) and Intelligence Community (IC) for embedded cyber (i.e. securing systems/software), microelectronics (i.e. trust/assured hardware), and product security (i.e. red teaming, penetration testing, and program assessments of DoD weapon systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification: ISACA Certified Information Security Manager (CISM)ISACA Certified Information Systems Auditor (CISA)ISC Certified Information Systems Security Professional (CISSP)ISC Certified Cloud Security Professional (CCSP)ISC Certified Authorization Professional (CAP.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Information Systems Security team is seeking a second level (Level 2) Cyber Information Systems Security Manager to lead a team of Information Systems Security Professionals (ISSOs/ISSMs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such CISSP (Certified Information Systems Security Professional), CEH (Certified Ethical Hacker), CISM (Certified Information Security Manager), are a plus.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide thought leadership, advising on emerging cyber security trends, zero trust architectures, and defensive cyber best practices. Evaluate and recommend cybersecurity systems for specific use cases based on cyber security systems research and analysis of relevant Office of Management and Budget (OMB) Executive Orders.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CERTIFITCATION REQUIREMENTS At least one of the following must be active: CISSP (Certified Information Systems Security Professional), Cloud Security Certifications (such as CCSP, Microsoft Azure Security Engineer Associate), Vendor Certifications, PMP (Project Management Professional), CSM (Certified ScrumMaster), PMI-ACP (Agile Certified Practitioner.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security certifications (e.g. The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
HS Diploma with 7-9 incident management or cyber security experience Desired Certifications: GCIH, GCFA GISP, GCED, CCFP or CISSP Our Company Overview: Business Computers Management Consulting Group, LLC (BCMC) is an Small Business specializing in Information Technology (IT), Cybersecurity, Information Assurance (IA), SOA, Big Data Management, Program Management, and more for Federal, State, and Local agencies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of experience as an Information System Security Analyst, Information System Security Officer, or Information System Security Manager. Our federal client is looking for Cyber Risk Assessor.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Through the JSP Cyber Security program, JSP performs a wide variety of services and functions required to secure the information security posture for DoD services. Address physical security matters to information assessments, security tests and evaluations, preparation of Contingency Plans, and administration of Life Cycle Management and Configuration Management documentation.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as the Business Information Security Officer (BISO) in the National Security Sector, acting as the bridge between business and cybersecurity, anticipating sector needs, and understanding sector strategy to offer security-based advisory services.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
6+ years of relevant experience in information assurance, cyber security, or information technology. The Sr. Security Specialist reports to the Program Manager of FISMA Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for an experienced Project Manager who has experience managing in an Enterprise Information Security/Cyber Security environment. Experienced in managing projects in an Information Security/Cyber Security environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Analytical Thinking, Business Security, Cyber Threat Intelligence, Decision Making, Information Security, Internal Auditing, Operational Threat Intelligence, Physical Security, Security Risk, Technical Training, Troubleshooting, Vendor Management.
ExpandApply NowActive JobUpdated Today
cyber security information manager jobs in Washington, DC
FEATURED BLOG POSTS
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.