- UpvoteDownvoteShare Job
- Suggest Revision
You will support the Chief Information Security Officer (CISO), the Chief of Classified IT Compliance and the Principal Organizational Information System Security Manager (ISSM) in carrying out the Laboratory 's Classified Information Security Program.
Full-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Have a strong working knowledge of the National Industrial Security Program Operating Manual (NISPOM) and the Defense Counterintelligence and Security Agency (DCSA), Defense Information Systems Agency (DISA), Joint Staff Special Access Program Implementation Guide (JSIG), Intelligence Community, Risk Management Framework (RMF), NAVSEA/other U.S. government inspection processes and policy requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The incumbent ensures the timely flow of risk, vulnerability and threat information across VRO and DCSA; conducts complex research, analysis and comprehensive reviews using unclassified/open-source and secure/classified systems including SIPRNET and JWICS. The incumbent independently authors written risk assessments and provides all source analytical briefings to personnel security personnel, insider threat hubs, and other outside agencies.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Liaise with other IDA/C&C Security staff; Information System Security Officer (ISSO) and Information System Security Manager (ISSM) to ensure security policies and procedures are in compliance with IDA, government and customers’ requirements.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
If selected, you will be subject to a government security clearance investigation and must meet the requirements for access to classified information. As a member of our team, you 'll contribute to the security and oversight of our classified information systems in support of real world, mission focused tasks.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology, Computer Science, Mathematics, Data Science, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
$102,477 - $191,900 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
DoD IAT Level II certification (CCNA Security or CySA+ or GICSP or GSEC or Security +CE or SSCP) DoD IAT Level III certification (CASP+CE or CCNP Security or CISA, or CISSP, GCED, or GCIH, CCSP.
ExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Department of Defense (DoD) Cyber Crime Center (DC3) DoD-Defense Industrial Base (DIB) Collaborative Information Sharing Environment (DCISE) penetration testers conduct Adversary Emulation Tests (AETs) against DIB Partners external and internal networks, upon request, associated with the processing of Covered Defense Information (CDI.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Dezign Concepts and Triune Solutions have formed a strategic partnership aimed at sourcing skilled IT professionals for the National Security Agency (NSA). We are uniquely positioned to provide the intelligence community with exceptional talent, reinforcing our shared commitment to advancing the mission-critical operations that safeguard our nation's security.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred: One or more nationally recognized information system auditing certifications OSEP (Offensive Security Experienced Penetration Tester) OSCP (Offensive Security Certified Professional) GXPN (GIAC Exploit Researcher and Advanced Penetration Tester) GPEN (GIAC Certified Penetration Tester) LPT (Licensed Penetration Tester.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Relevant experience must be in one or more of the following areas: computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance, systems engineering, or updating information assurance documentation (for example System Security Plans, Risk Assessment Reports, Certification and Accreditation packages, and System Requirements Traceability Matrices.
$79,735 - $191,900 a yearFull-timeExpandApply NowActive JobUpdated 26 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Fort Meade MD Jobs, ServiceNow System Administrator, ServiceNow, Systems Administrator, IT Service Management, ITSM, Information Technology Infrastructure Library, ITIL, Governance, Risk, and Compliance, GRC, Human Resources, HR, and Customer Service Management, CSM, JavaScript, PowerShell, Incident Management, Problem Management, Change Management, Service Catalog, Support, Systems Administration, Security Clearance, Maryland Recruiters, IT Jobs, Maryland Recruiting.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience creating offensive security tools (such as Cobalt Strike / Metasploit) malware implants, and other red team capabilities in one or more programming languages. Our department is responsible for delivering and advancing MITRE s adversary emulation expertise across all of MITRE s national security, public sector, and private sector sponsors.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, CompTIA Security +, CCNA/CCNP Security, Juniper JNCIP-SEC or relevant industry security certifications. Palo Alto Networks Certified Network Security Engineer (PCNSE.
ExpandApply NowActive JobUpdated 1 month ago
information security jobs Company: Texas Health Resources in Odenton, MD
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.