- UpvoteDownvoteShare Job
- Suggest Revision
Working in close coordination with technical teams and cross-functional stakeholders (e.g., Finance & Accounting, Procurement, Information Security), the IT Asset Manager establishes, enforces, monitors, and continuously improves asset management processes, standards, and controls.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The CIC supports cybersecurity monitoring, threat analysis, incident response, and infrastructure remediation within and across all of the State Department's information technology (IT) infrastructure.
Full-timeExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Currently, ManTech is seeking a motivated, career and customer-oriented Program Chief Information Security Officer (CISO) IV to join our team in the DMV area. For all positions requiring access to technology/software source code that is subject to export control laws, employment with the company is contingent on either verifying U.S.-person status or obtaining any necessary license.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Has delegated authority to manage and prioritize workflow, and initiate communications on behalf of the Vice President, Information & Technology Services regarding oversight of and follow-up reporting on budget, vendor communications, operational activities, and projects.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support business case analysis in support of the Activity CIO prior to submission of new or updated Information Technology application requests on NAVSEA’s technological infrastructure. Support the overall management and day-to-day operations of the Information Technology functions, as used by PEO IWS. This includes monitoring the status of all unique and leveraged investments by PEO IWS in data centers, technical service centers, help desks, communication networks (voice and data), computer systems operations and maintenance, integrated data environments.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keen understanding of the National Institute of Standards and Technology (NIST) Risk Management Framework (RMF) in detail of all supporting steps and Cybersecurity Framework (CSF) and Privacy Act. Knowledge General Services Administration Federal Risk and Authorization Management Program (FedRAMP) including process for continuous monitoring At least 3 years of experience: Assisting system owners with the mitigation/remediation process, following corrective action plans.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They report to the Program Chief Information Security Officer (CISO). The applicant will be required to answer certain questions for export control purposes, and that information will be reviewed by compliance personnel to ensure compliance with federal law.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
$134,100 a yearExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Fiserv products, such as DNA, MPC, Axiom and credit union or financial services industry experience preferredExperience/familiarity with the Information Technology hardware, software, principles, and practices preferredExperience/familiarity with governance and management of cloud-based solutions preferredRelevant technical certifications, e.g. MS Office, A+, etc.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Cybersecurity-related certifications such as Certified Information Security Professional (CISSP), GIAC Defensible Security Architecture (GDSA), GIAC Certified Incident Handler (GCIH), CERT Certified Computer Security Incident Handler (CSIH), GIAC Certified Forensic Examiner (GCFE), and Offensive Security Certified Professional (OSCP.
Full-timeExpandApply NowActive JobUpdated 2 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The ideal candidate would have an understanding of AML technology and demonstrated experience in the financial services industry. Financial Crime Technology Senior Consultant. crowe.com) is one of the largest public accounting, consulting and technology firms in the United States.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Additional details can be found on our website at: / Position Title: DHS Information Systems Security Engineer (ISSE) Senior Location : NCR Clearance : TS/SCI OneZero solutions is on contract to provide division wide support for Federal Information Security Modernization Act (FISMA) compliance, execution of the Risk Management Framework (RMF) process to achieve and maintain Authority to Operate (ATO) accreditations and deliver cyber security compliance for DHS operational mission systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ideal candidates would have at least two years of experience in transportation civil engineering related to roadway design Bentley OpenRoads Designer proficiency is essential AutoDesk Civil 3D proficiency is a plus VDOT experience preferred EIT preferred Additional Information The requirements listed are representative of the knowledge, skills and/or abilities required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
OIM is comprised of three primary offices: the Office of the Director, the Cyber Security Division, and the Information Technology Services Division. Communicate to business unit customers the direction of information management and cyber security technology initiatives; and serve on SC and interagency committees and participates on special task forces to provide advice and guidance on state-of-the-art technology and cyber solutions.
ExpandUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in system engineering, Computer Science, Information Technology or related discipline. Certified Ethical Hacker (CEH) (red), Cybersecurity Analyst (CySA+) (blue), Certified Information Systems Auditor (CISA), or GIAC Systems and Network Auditor (GSNA) and IAM II.
ExpandApply NowActive JobUpdated 6 days ago
information technology jobs Title: director Company: Molecula in Hyattsville, MD
FEATURED BLOG POSTS
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.