- UpvoteDownvoteShare Job
- Suggest Revision
Our client is looking for a Information Security Engineer to join their team. DESIRED QUALIFICATIONS/EXPERIENCE: Bachelor's degree in Information Technology or a related technical field with a minimum of two years of experience in a Cybersecurity role.
$58 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
See Smithsonian EEO program information: www.si.edu/oeema. A background with fundraising databases including Ellucian Advance, Salesforce, Tessitura, or Raisers Edge is preferred. Experience with membership, fundraising, non-profit organizations and/or database management preferred.
$96,556 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vice President, Information Technology, Duties & Responsibilities: Collaborate with IT and business leadership to determine annual and ongoing IT project portfolio and priorities. Vice President, Information Technology, Selection Criteria: At least 10 years of experience in Information Technology field; software development or operations background is preferred.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Plan, and Security Assessment Plan, etc.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 3 years of experience with information security, including penetration testing, intrusion detection, incident response, threat analysis, or digital forensics. phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Vice President of Information Technology, reporting to the Chief Operating Officer, serves as the principal technology leader for the university, providing the vision and management for developing and implementing information technology strategies and initiatives across UDC. An experienced and talented VP of IT will act as a key leader and collaborative partner, working with other academic and administrative leaders to further institutional goals and outcomes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify contractor personnel and qualifications to support the functions of the PEO IWS Activity Chief Information Officer (CIO) and the Enterprise Architect supporting the ACIO team. Assist the NMCI/NGEN Chief Information Officer (CIO) for PEO IWS by reviewing and reporting on the compliance of information systems policies, certification, and accreditations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred:Experience with using and configuring Aqua SecurityWorking knowledge of container security concepts, threats, and mitigationsCurrent information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM.
$178,603Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Are you looking for an opportunity to share your experience in information security and cybersecurity guided by the NIST Risk Management Framework (RMF) to safeguard applications from security threats.
$220,000 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cybersecurity Specialist will work in a collaborative unified team environment to monitor, evaluate, and manage the risk posture of systems' authorization boundary to safeguard information systems by leveraging robust understanding of NIST Risk Management Framework (RMF.
$146,875 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Education: Bachelor’s degree from an accredited University; or Graduate Degree from an accredited University; ORCertification: Certified Information Security Manager (CISM); orCertified Information Systems Security Professional (CISSP); orGIAC Security Essentials Certification (GSEC); orGIAC Security Leadership Certification (GSLC)Security Clearance Requirements: This position will require.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Performs duties as assigned by Pharmacy Manager, Staff Pharmacist and Store Manager including utilizing pharmacy systems to enter patient and drug information, ensuring information is entered correctly, filling prescriptions by retrieving, counting and pouring pharmaceutical drugs, verifying medicine is correct, and checking for possible interactions.
$18 - $21.5 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Jamf certification Microsoft Certified Professional (MCP), Microsoft Certified Solutions Associate (MCSA) Additional information: Benefits Included: Medical,dental, and vision coverage designed to help you and your family live a healthy lifestyle.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker (CEH) Certification or Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP). As a Vision, Mission, and Driven company, VMD has been delivering information technology solutions to the Federal government in Agile Engineering, Cybersecurity, and Critical Infrastructure Protection since 2002.
Full-timeExpandApply NowActive JobUpdated 2 days ago
information job in College Park, MD
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.