- UpvoteDownvoteShare Job
- Suggest Revision
Works with highly matrixed team of IS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Establish and maintain strong partnership with other Global Information Security (GIS) functions, Core Technology Infrastructure (CTI), Cyber Security Technology (CST), Third Party management, Global Compliance and Operations Risk (CGOR), internal audit, and regulatory agencies.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The incumbent in this position will focus on areas relating to risk management, continuity of operations, and disaster recovery in support of the information security program. Requisition No: 828027 Agency: Department of Law Enforcement Working Title: INFORMATION SECURITY SPECIALIST- 71001685 Pay Plan: Career Service Position Number: 71001685 Salary: $55,000.00 Posting Closing Date: 06/26/2024 Total Compensation Estimator Tool INFORMATION SECURITY SPECIALIST INFORMATION TECHNOLOGY SERVICES NETWORK AND INFORMATION SECURITY - RISK.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requires in depth knowledge of identity and access management (IAM) architecture, engineering and operations to protect access to data; authoring security policies, standards, controls and metrics; knowledge of related technologies: web, network, server, database security; IAM control operations and providing evidence of compliance and control efficacy.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience supporting DoD security functions to include operations security, critical program information/technology protection, declassification, and SCI and SAP security policies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Account Management Analyst will be supporting a U.S. Government customer on a large mission critical development and sustainment program to design, build, deliver, and operate a network operations environment; including introducing new cyber capabilities to address emerging threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Report suspected or actual cybersecurity incidents immediately to the NASA Security Operations Center (SOC). Summary As an Information System Security Officer with the NASA Cybersecurity and Privacy Division you will be responsible for executing the Information System Security Officer function supporting multiple NASA corporate, research and engineering System Security Plan. Responsibilities Function as the Information Systems Security Officer (ISSO) supporting NASA Information System Owners on Continuous Monitoring and Assessment and Authorization efforts.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Job Title - Information Security Specialist. One (1) year demonstrated experience performing systems administration, network management, security systems operations, cloud security (e.g., firewalls, antivirus, IDS/IPS), configuration management standards and baselines, and change control technologies.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Key responsibilities include conducting analyses of the threat environment and threats to the bank, including post incident analysis, applying a multi-faceted situational awareness of cyber security processes to protect against threats, and implementing proactive defensive actions for the security, continuity, and confidentiality of information.
$93,700 - $141,700 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Peraton has an opportunity for Information System Security Specialist (RMF) in Huntsville, AL. This includes conducting Agile software engineering in a Development, Security, and Operations (DevSecOps) environment, performing Cloud architectural design, operation, and administration functions, and cyber security and Risk Management Framework (RMF) support.
$66,000 - $106,000 a yearFull-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in completing Risk Management Framework Step 5 authorizations in the Information System Security Engineer (ISSE) capacity. Provide technical and programmatic Information Assurance Services to internal and external customers in support of network and information security systems.
$66,000 - $106,000Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Summary You will serve as a SUPERVISORY INFORMATION TECHNOLOGY SPECIALIST (PLCYPLN) in the SWFPAC, OPERATIONS MANAGEMENT DEPT (SPB10), INFORMATION TECHNOLOGY DIV (SPB16) of STRATEGIC WEAPONS FACILITY PACIFIC. Duties.
Part-timeExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Under the direction of senior leadership within the Office of Information Technology Services\Chief Information Security Office\Cyber Command Center, the incumbent will be a member of the team that is responsible for the ingestion and response to all forms of threat intelligence and vulnerability announcements received from many third parties such as vendors, DHS CISA, MS-ISAC, NYSP, and other sources of open-source intelligence.
$93,530 - $117,875 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Global Information Security (GIS) Identity & Access Management (IAM) Info Security Senior Controls Specialist must possess a deep understanding of IAM concepts, relevant knowledge of IAM business, and strong technical expertise.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identity & Access Management (IAM) Information Security Controls Specialist. The Identity & Access Management (IAM) Info Security Controls Specialist will analyze, strengthen, and secure the company's IAM systems and overall security posture for Service Accounts Governance.
$150ExpandUpdated 4 days ago
operations specialist jobs Title: specialist security information in Morgan-city, Louisiana
FEATURED BLOG POSTS
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: