- UpvoteDownvoteShare Job
- Suggest Revision
Direct experience with providing expert support, analysis and research in Intelligence Community (IC) and DoD Risk Management Framework (RMF) requirements and processes to support the IC, DoD and Army RMF assessment and authorization processes Includes experience as a technical SME, Information System Security Officer (ISSO) or Information Security System Engineer (ISSE) on Army Program Of Record (POR)/Quick Reaction Capability (QRC) products.
Starting at $200,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain Risk Management Framework (RMF) Enterprise Mission Assurance Support Service (eMASS) Assess Only packages in support of tactical PIT devices through coordination with vendor on Security Technical Implementation Guide (STIG) development and Assured Compliance Assessment Solution (ACAS) scans.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities Build, coordinate, maintain, change, and keep updated, the Risk Management Framework (RMF) Assessment and Authorization (A&A) packages. Overview Abacus Technology is seeking a Cyber Security Management Specialist to provide technical support for the for the Army Test and Evaluation Command (ATEC) at Aberdeen Proving Ground.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Gather and analyze a system's cybersecurity posture with DoD and Industry cybersecurity tools such as Tenable Assure Compliance Assessment Solution (ACAS) Nessus scanner, DoD Security Technical Implementation Guidelines (STIGs), Security Content Automation Protocol (SCAP) Compliance Checker (SCC), Evaluate-STIG, varied Firewall and IDS/IPS technologies, Endpoint Security products, Security Incident and Event Management, and PKI.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of continuous monitoring, cyber security risk management, disa ster recovery, FISMA compliance, information security architecture, information security auditing, security control assessment, threat modeling, threat management, vulnerability analysis, and vulnerability assessments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in information security or network/system administration, including IT auditing, IT compliance, and enterprise risk management. Build, coordinate, maintain, change, and keep updated, the Risk Management Framework (RMF) Assessment and Authorization (A&A) packages.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Supporting defined IA and Assess and Authorize (A&A) activities, including System Security Plan (SSP) and other supporting documentation development/review, System Vulnerability Assessments, Security Test and Evaluation (ST&E) planning, execution and data collection, test data reduction and analysis, and residual risk assessment reporting necessary to support system accreditation.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking an Information Systems Security Officer - Journeyman tosupport Project Manager, Intelligence Systems & Analytics (PM IS&A) Cybersecurity Support Services by supporting cybersecurity systems engineering, assessment and authorization, field service engineer, and other management support services necessary to accomplish the missions and goals.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Direct experience with providing expert support, analysis and research in Intelligence Community (IC) and DoD Risk Management Framework (RMF) requirements and processes to support the IC, DoD and Army RMF assessment and authorization processes.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
CACI is actively seeking a highly skilled and experienced Mid to Senior Cyber Security Engineer to join our Cybersecurity Team. The ideal candidate will possess a deep understanding of cybersecurity principles and specialized expertise in eMASS (Enterprise Mission Assurance Support Service), STIG (Security Technical Implementation Guide), ACAS (Assured Compliance Assessment Solution), and the ability to conduct Security Control Assessment - Authorization (SCA) assessments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience providing incident response, performing security assessments and inspections and conducting risk management activities at the enclave level. Maintain and update database for assessing/managing risk, and authorizations for all data networks, and maintain and monitor progress of assigned IT personnel's progress in maintaining compliance with the Federal Information Security Management Act, Intelligence Community, and DoD compliance requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Serve as the liaison between the contract and the government for all Information Security endeavors to include Risk Management Framework Assessment and Authorization tasks, Continuous Monitoring, and government IT connection and application issues.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking an CDSS - Information Systems Security Engineer - SME tosupport Project Manager, Intelligence Systems Analytics (PM IS A) Cybersecurity Support Services by supporting cybersecurity systems engineering, assessment and authorization, field service engineer, and other management support services necessary to accomplish the missions and goals.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Management Specialist. Experience providing incident response, reviewing security assessments and inspections and conducting risk management activities at the system level.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 3 days ago
security management assessment jobs in Aberdeen Proving Ground, MD
FEATURED BLOG POSTS
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
Learn How to Respond to an Interview Request With Templates
Job interviews are an inevitable part of any job search. So, handling them well is key to building a fulfilling career. Regardless of whether you’re looking at a more junior role or strive for a role as a business executive, you need to maintain your professionalism every step of the way in order to stay in the game.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.