- UpvoteDownvoteShare Job
- Suggest Revision
Working in close coordination with technical teams and cross-functional stakeholders (e.g., Finance & Accounting, Procurement, Information Security), the IT Asset Manager establishes, enforces, monitors, and continuously improves asset management processes, standards, and controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The CIC supports cybersecurity monitoring, threat analysis, incident response, and infrastructure remediation within and across all of the State Department's information technology (IT) infrastructure.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Currently, ManTech is seeking a motivated, career and customer-oriented Program Chief Information Security Officer (CISO) IV to join our team in the DMV area. For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.-person status or obtaining any necessary license.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Has delegated authority to manage and prioritize workflow, and initiate communications on behalf of the Vice President, Information & Technology Services regarding oversight of and follow-up reporting on budget, vendor communications, operational activities, and projects.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support business case analysis in support of the Activity CIO prior to submission of new or updated Information Technology application requests on NAVSEA’s technological infrastructure. Support the overall management and day-to-day operations of the Information Technology functions, as used by PEO IWS. This includes monitoring the status of all unique and leveraged investments by PEO IWS in data centers, technical service centers, help desks, communication networks (voice and data), computer systems operations and maintenance, integrated data environments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keen understanding of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in detail of all supporting steps and Cybersecurity Framework (CSF) and Privacy Act. Knowledge General Services Administration Federal Risk and Authorization Management Program (FedRAMP) including process for continuous monitoring At least 3 years of experience: Assisting system owners with the mitigation/remediation process, following corrective action plans.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
They report to the Program Chief Information Security Officer (CISO). The applicant will be required to answer certain questions for export control purposes, and that information will be reviewed by compliance personnel to ensure compliance with federal law.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
$134,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Fiserv products, such as DNA, MPC, Axiom and credit union or financial services industry experience preferredExperience/familiarity with the Information Technology hardware, software, principles, and practices preferredExperience/familiarity with governance and management of cloud-based solutions preferredRelevant technical certifications, e.g. MS Office, A+, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate would have an understanding of AML technology and demonstrated experience in the financial services industry. Financial Crime Technology Senior Consultant. crowe.com) is one of the largest public accounting, consulting and technology firms in the United States.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidates would have at least two years of experience in transportation civil engineering related to roadway design Bentley OpenRoads Designer proficiency is essential AutoDesk Civil 3D proficiency is a plus VDOT experience preferred EIT preferred Additional Information The requirements listed are representative of the knowledge, skills and/or abilities required.
Full-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
OIM is comprised of three primary offices: the Office of the Director, the Cyber Security Division, and the Information Technology Services Division. Communicate to business unit customers the direction of information management and cyber security technology initiatives; and serve on SC and interagency committees and participates on special task forces to provide advice and guidance on state-of-the-art technology and cyber solutions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in system engineering, Computer Science, Information Technology or related discipline. Certified Ethical Hacker (CEH) (red), Cybersecurity Analyst (CySA+) (blue), Certified Information Systems Auditor (CISA), or GIAC Systems and Network Auditor (GSNA) and IAM II.
ExpandApply NowActive JobUpdated Today
information technology jobs Title: director Company: Molecula in Hyattsville, MD
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.