- UpvoteDownvoteShare Job
- Suggest Revision
MUST HAVE ACTIVE SECURITY CLEARANCE Responsibilities of the Cyber Risk Manager:· Oversee all aspects of cybersecurity program management, including risk management, compliance, incident response, and vendor management.
$120,000 - $140,000 depends on experience (negotiable)ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leveraging your significant experience in information security, cloud architecture and engineering, vulnerability management, and DevSecOps practices, you will be expected to broaden and sharpen our capability to manage the incoming security engineering needs while rapidly surfacing, driving down, and reporting on vulnerabilities across our AWS, GCP, and Azure environments.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our Federal Sales Manager, (FSM) will lead the sales process within an assigned territory for the National Security. The Federal Sales Manager, National Security Opportunity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Looking for an Endpoint Security Manager who will be responsible for managing the endpoint devices within our client’s organization, ensuring that they are secure, up-to-date, and functioning at peak performance.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The CPSO will assist the Information System Security Manager (ISSM) or Information System Security Officer (ISSO) with maintaining appropriate accreditation documentation for each information system (IS) within the secure area under their cognizance and address any shortcomings.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: At least one of the following security certifications: Certified Authorization Professional (CAP); Certified Information Systems Security Officer (CISSO); Certified Information Security Manager (CISM); or Certified Information Systems Security Professional (CISSP.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As staff leader of the College of Information Studies’s iConsultancy Program, the Client Manager is responsible for all aspects of the iConsultancy experience for students, faculty, and industry partners, including scaling up the program as industry participation grows.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with insider threat detection tools, data loss prevention (DLP) solutions, and security information and event management (SIEM) systems. Collaborate with DoD Components, the Intelligence Community (IC), the Office of the Director of National Intelligence (ODNI), and the National Insider Threat Task Force (NITTF) and on security and Insider Threat matters to further advance the DoD Counter InT mission.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISM - Certified Information Security Manager or. This work may be supervised by the Information Security Audit Manager. Bachelor's Degree in Computer Science, Cyber Security, Information Technology, or related field OR in lieu of a Bachelors degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
$250Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of cybersecurity program planning and sequencing, including governance, risk management, architecture, technology onboarding, vulnerability management, awareness and training, and cyber third-party risk management.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Facilitate and manage CBRNE portfolio at a programmatic level, in close coordinate with Government Program Manager. We are currently seeking a Chemical, Biological, Radiological, Nuclear, and Explosives (CBRNE) Program Analyst.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience as an application security engineer using a suite of tools used for the following: Recon and Information Gathering (e.g. Nmap, NetCat, Spiders, OWASP Zed Attack Proxy). Qualified/ Security Analyst Penetration Tester (Q/PTL) from Security University.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Individuals in this role must be well versed and educated in common Information Security practices and the CISSP domains, and have general Information Technology experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SBA Office of the Chief Information Officer (CIO) Information Security Division (ISD) supports the mission of delivering cybersecurity, privacy, controlled unclassified information programs, and records management services throughout the.
$150Full-timeExpandApply NowActive JobUpdated Today
security program manager information technology jobs Title: network in Washington, DC
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.