- UpvoteDownvoteShare Job
- Suggest Revision
The Telecommunications Engineer must have experience and working knowledge related to the design, configuration, installation, and testing in all or most of the following systems: Closed Circuit Television (CCTV), Personnel Access Control Systems, Perimeter Intrusion Detection Systems, Public Address/General Alarm systems (PA/GA), wired and wireless network systems, Telephony Systems, Digital Radio Systems, Marine Systems, Microwave Systems, and Cyber Security implementation methods.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of NIST Framework, MS-365 Security & Compliance, DLP, SIEM, CrowdStrike, Cisco Umbrella, Incident management, TCP/IP (Transmission Control Protocol/Internet Protocol), OSI (Open Systems Interconnections) Model, DNS (Domain Name System), and DHCP (Dynamic Host Configuration Protocol.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As the Associate Instrumentation and Controls Engineer you will be involved with the design, development, implementation, and maintenance of the division’s software-based Industrial Control Systems (ICS) throughout the entire system development life cycle, including configuration control, software quality assurance, and cyber security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage all functions of the defense industrial security program and special access programs, i.e. physical security, classified cyber security (network, standalone and test equipment), visitor control, security clearance processing, document control, classification management, contract security specification administration, COMSEC operations, security education and awareness, investigations, asset protection, access control, etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Software Change Control, Change Management, Code Quality, Static Analysis, and CI/CD tools such as: Atlassian tool suite, Jira, GitHub, GitLab, SonarQube, Coverity, AND/OR Jenkins.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Follows processes and procedures for network systems change management, configuration control, preventative maintenance, access control in accordance with the GRU Cyber Security Policy and the NERC Critical Infrastructure Protection (CIP) requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ground Software Engineering, Cyber Software Security Assurance (C/SSA), Mission Software Integration, Systems Engineering, ISSM, ISSE, and ISSOs∯*∯ The Cyber lead has primary oversight of a ISSE and C/SSA activities focused on Cyber CDRL development and Static and Dynamic security scanning of Ground Mission Unique Software.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Description: Markon Solutions is seeking a Senior Cyber Security Engineer to capture and refine information security requirements and ensure that the requirements are integrated into information technology component products and information systems through purposeful security architecting, design, development, and configuration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge, Skills, and Abilities Knowledge In-depth knowledge of mechanical parts, components, and systems configuration including PLC. Understanding of plumbing systems, mechanical facilities and system such as air compressor, boiler and water quality control, cooling tower and water quality control ,HVAC system, waste water treatment, fire protection systems, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with the IT Department in the maturation and configuration of security controls including but not limited to EDR, SIEM, IT/OT vulnerability management, and network security technologies.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional certification such as Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM) or other Industry related certifications.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage & enhance the cyber risk management program to ensure proactive and comprehensive approach to managing cyber risk within PSEG. Optimize and streamline third-party risk management processes to ensure effective oversight and adherence to security requirements.
$114,500 - $188,100 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ensuring that patches are deployed to all supported workstations, servers, network devices and applications to maintain compliance Ensuring the secure configuration of all supported workstations, servers, network devices and applications Managing submission of exceptions to Cyber Security related to patch and configurations that cannot be applied Facilitate change control and management for patching, configuration.
ExpandApply NowActive JobUpdated Today
quality control systems configuration management cyber security jobs Company: Clearancejobs in Lexington, Massachusetts
FEATURED BLOG POSTS
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.