- UpvoteDownvoteShare Job
- Suggest Revision
The Information Assurance Officer (IA Officer/ISSO) collaborates closely with the cross-functional team comprised of cybersecurity, system administrators, and desktop support to perform and report on continuous monitoring, vulnerability management scanning, patching, analysis; review, maintenance, and update eMASS records for document updates, security controls, POAM milestones, and compliance, ensure application of DISA quarterly STIG releases and STIG results analysis.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet),Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience in the security sub-disciplines supporting Army IA, certification and accreditation, IA security testing, and security management for both developmental and production systems, including but not limited to Communications Security, Physical Security, OPSEC, Risk Assessments, Personnel Security, Tempest, Network Security, Security Inspections, and User Training.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Title: DHS Sr. Cyber Network / Computer Systems Engineer Location: Washington D.C. Near the Metro Center Clearance: TS/SCI Job description: Our great client is on contract to provide division-wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) security authorizations, and deliver cyber security compliance for DHS Operational Technology Mission Systems.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will own the architecture, engineering, and technology operations of Identity & Access Management (IAM), network security, cloud security, Microsoft Cybersecurity Reference Architecture (MCRA), Operational Technology (OT) Cybersecurity, and data protection.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management.
$60 - $68 an hourFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They are expected to be an expert in two or more Information Security related subject areas (e.g., identity and access management, web application security, penetration testing, cloud security, network security, secure code development, encryption, mobile application security, systems, and platform security, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
OneZero Solutions is on contract to provide division-wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) security authorizations, and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additionally, the Security Engineering Manager will support the Corporate Information Security (CIS) Governance, Risk, and Compliance (GRC) team during audits and assessments. Five or more years of experience directly administering technical controls (e.g., identity and access management, malware protection, network segmentation, vulnerability management, etc.
Full-timeRemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hold at least one of the following certifications: Certified Information Systems Security Professional (CISSP), Global Information Security Professional (GISP), or the CompTIA Advanced Security Practitioner (CASP) or Information Assurance Management (IAM) Level II proficiency.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of related Network Security Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with one or more of these tools: - SecureSphere Imperva Web Application Firewalls (WAF), Database Activity Monitoring (DAM) - RSA Security Analytics (NetWitness) - Symantec Bluecoat - Cisco FirePower (SourceFire) - Splunk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cyber security business and systems subject matter management expertise in Application Security, Data Security, Data Governance, and Network Security domains.
$102,240 - $203,060 a yearFull-timeRemoteExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance Formal Education Master of Science degree (or higher) in one of the following: computer science, electronics engineering, computer engineering, computer science, information technology, or cyber security.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Global Information Assurance Certification (GIAC) Security Essentials Certification Years of Professional Experience 10 years’ experience in Cyber Security Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience.
Full-timeExpandApply NowActive JobUpdated 16 days ago
network security information management jobs in Washington, DC
FEATURED BLOG POSTS
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.