- UpvoteDownvoteShare Job
- Suggest Revision
You will support the Chief Information Security Officer (CISO), the Chief of Classified IT Compliance and the Principal Organizational Information System Security Manager (ISSM) in carrying out the Laboratory 's Classified Information Security Program.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Essential Job Responsibilities Designs and implements information assurance and security engineering systems with requirements of business continuity, operations security, cryptography, forensics, regulatory compliance, internal counter-espionage (insider threat detection and mitigation), physical security analysis (including facilities analysis, and security management.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology, Computer Science, Mathematics, Data Science, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
$102,477 - $191,900 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
A BS degree in Computer Science, Management Information Systems, Computer Information Systems, Information Assurance, or a comparable field or equivalent years of professional relevant.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or updating information assurance documentation (for example System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices.
$79,735 - $191,900 a yearFull-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Have a strong working knowledge of the National Industrial Security Program Operating Manual (NISPOM) and the Defense Counterintelligence and Security Agency (DCSA), Defense Information Systems Agency (DISA), Joint Staff Special Access Program Implementation Guide (JSIG), Intelligence Community, Risk Management Framework (RMF), NAVSEA/other U.S. government inspection processes and policy requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Complete all responsibilities according to established protocols, policies, and standard practices in the areas of customer service, quality assurance, and regulatory compliance programs such as HIPAA (Health Information Portability & Accountability Act), OSHA (Occupational Safety & Health Act), and CUA (Clinical Laboratory Improvement Administration) and Title X.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support and encourage a culture that: Provides a rich conduit of information and ideas between sites and other PPMW departments, Participates in ongoing feedback with colleagues, Incorporates customer satisfaction into all aspects of the work and Encourages team to take responsibility for evaluating and improving systems.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
A BS degree in Computer Science, Management Information Systems, Computer Information Systems, Information Assurance, or a comparable field or equivalent years of professional relevant Security Engineering experience working with DoD IT enclaves, systems, and solutions.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Security Engineer with MTSI you will contribute to the defense of U.S. National and Defense critical infrastructure and information systems against sophisticated adversaries by providing engineering and technical leadership combined with an operational understanding of cybersecurity.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DoD IAT Level II certification (CCNA Security or CySA+ or GICSP or GSEC or Security +CE or SSCP) DoD IAT Level III certification (CASP+CE or CCNP Security or CISA, or CISSP, GCED, or GCIH, CCSP.
ExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience and general familiarity with the following: Knowledge of AWS Services and storage mechanisms, performing system administration within the AWS Cloud environment, Windows System Administration, BigFix installation and reporting, maintaining system security plans, experience with Jira and Confluence, experience mitigating information assurance vulnerability alerts (IAVA, Patch management IAVA.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Liaise with other IDA/C&C Security staff; Information System Security Officer (ISSO) and Information System Security Manager (ISSM) to ensure security policies and procedures are in compliance with IDA, government and customers’ requirements.
Full-timeExpandApply NowActive JobUpdated 1 month ago
information security assurance jobs Company: Capital One in Odenton, MD
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!