- UpvoteDownvoteShare Job
- Suggest Revision
The SBA Office of the Chief Information Officer (CIO) Information Security Division (ISD) supports the mission of delivering cybersecurity, privacy, controlled unclassified information programs, and records management services throughout the.
$150Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience analyzing high volumes of logs, network data (e.g., Netflow, Full Packet Capture), and other attack artifacts in support of incident investigations and in-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., Google Chronicle, ArcSight, Splunk,Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Geography or related physical or geospatial science such as Civil Engineering Technology, Construction Technology, Cartography, Information Technology, Computer Science, Urban Studies/ Planning, Architecture, Engineering, Interior Design, Drafting or Construction related field.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Through STRIDES, this work will assist up to 50 counties prioritized for the Global Health Security (GHS) program of varying capacitates in countries in Africa, Asia, and the Latin America/Caribbean regions to support different discrete aspects of the infectious disease detection and analytic pipeline.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keystone Advisors is an independent Certified Public Accounting firm providing Audit, Accounting, and Advisory Services in the areas of financial and administrative management, organizational and business improvement, program management support, budget support, financial analytical services and reconciliation, technology management and staff augmentation in Chicago, Washington, DC, Alexandria, VA, and other metropolitan areas.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position specifically supports NASAs Small Business Innovation Research and Small Business Technology Transfer (SBIR/STTR) program within the Agencys Space Technology Mission Directorate (STMD.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM) The Department of Homeland Security (DHS) is recruiting professionals to support a range of leadership roles in Cybersecurity Risk Management and Compliance, including Cybersecurity Risk Management Lead, Cybersecurity Governance Team Lead, Senior Risk and Compliance Program Manager, Cybersecurity Risk Consultant, Risk Assessment and Compliance Manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Summary: The Sr. Event Security and Safety Manager will manage the end-to-end physical security and safety of our owned consumer events (Regional, International, and World Championships.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Systems Engineering Manager will be a key part of the Leidos team supporting Connected Automated Vehicle (CAV) research across the US through our work at the U.S. Department of Transportation's (USDOT) Saxton Transportation Operations Laboratory (STOL), located at the Turner Fairbank Highway Research Center in McLean, VA. Our team helps to develop emerging technologies to improve transportation safety, mobility, and environmental impacts.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification is desirable, must be active/current, and v such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA), Certified Ethical Hacker (CEH), or other similar credentials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage all Information Assurance activities, enable the ongoing assessment and ongoing authorization of CDM solution utilizing Risk Management Framework (RMF), and automated Security Assessment and Authorization tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Engage with internal and external customers on personnel security to ensure the assigned program / project is fully integrated; leverage current threat intelligence to enhance or modify procedures.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct research and evaluate technical and all-source intelligence with specific emphasis on network operations and cyber warfare tactics, techniques, and procedures focused on the threat to networked weapons platforms and US and DoD information networks.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Technology at PNNL is a diverse team of computing and technology professionals with a clear mandate to leverage human-centered design to re-imagine how digital technologies can improve the research experience, enable data-driven insights for decision makers, enhance the efficiency of getting work done at the laboratory, and accelerate PNNL’s scientific discovery.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs (Windows and Unix), and databases.
Full-timeExpandApply NowActive JobUpdated 25 days ago
security program manager information technology jobs Title: network in Washington, DC
FEATURED BLOG POSTS
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.