- UpvoteDownvoteShare Job
- Suggest Revision
Associates within TRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, and risk management professionals. At least 5 years of experience working in information security, information technology or risk management.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth understanding of information security principles and best practices, including network security, cryptography, system security, vulnerability management, and incident response.
$200Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ll work performed must meet and comply with all National Institute of Standards & Technology (NIST), other government-wide laws and regulations, and MSPB and OCIO (Office of the Chief Information Officer) and Chief Information Security Officer (CISO) directives, guidelines, and requirements for protection and security of Information Technology.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton is seeking an experienced Principal Cyber Data Engineer with Splunk, UNIX, Network experience to become part of Peratons Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.
$86,000 - $138,000Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GDIT is currently seeking a candidate to serve as a FIRST Nuclear Security, Scientist Engagement, and Science Centers Program Analyst in support of the Bureau of International Security and Nonproliferation's Office of Cooperative Threat Reduction (ISN/CTR) at the U.S. Department of State.
$76,500 - $103,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Deep understanding of cybersecurity program planning and sequencing, including governance, risk management, architecture, technology onboarding, vulnerability management, awareness and training, and cyber third-party risk management.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Apply subject matter expert knowledge of Executive Order 13526, the National Industrial Security Program Operating Manual (NISPOM), DoD Information Security Manuals, and DoD SAP Security Manuals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Defense Enclave Services contract will unify the DOD Fourth Estate Defense Agencies and Field Activities’ common use information technology systems, personnel, functions, and program elements under the direction of DISA’s Fourth Estate Network Optimization program office.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In course of regular job duties, the selected candidate will gain exposure to many different enterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection, network intrusion prevention, firewall blocking, enterprise-wide incident response, and security information and event management (SIEM.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 8 years of experience in managing information security programs in accordance with the Federal Information Security Management Act (44 U.S.C. 3544), guidance and standards from the National Institute of Standards and Technology (NIST) and the Federal Information Processing Standards (FIPS.
$250ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
HUBzone, WOSB, SDVOSB, VOSB, data science, devsecops, cyber, oracle, tanium, program management, information technology, engineering services, architecture and engineering, Powder River Industries.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee, evaluate, and support the documentation, and validation processes necessary to assure that associates, information technology systems and business processes meet the organization's information assurance, security, and privacy requirements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: GIAC Certified Incident Handler (GCIH) Certified Information Systems Security Professional (CISSP) CompTIA Advanced Security Practitioner (CASP+) CompTIA Cybersecurity Analyst (CySA+) Project Management Professional (PMP) Certified Scrum Master (CSM) PMI Agile Certified Practitioner (PMI-ACP) Additional Skills: Familiarity with agile principles and their integration into cybersecurity functions.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
To become part of our Department of State (DoS) Diplomatic Security Cyber Mission (DSCM) program providing leading cyber and technology security experience to enable innovative, effective and secure business processes.
ExpandApply NowActive JobUpdated Yesterday
network security program information technology jobs Title: network manager in Silver Spring, MD
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.