- UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with the Security Control Assessor (SCA) to perform analysis of the overall risk level the system poses to enterprise networks and to mission data. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, Penetration Testing, Threat Hunting, and Preventing Advanced Persistent Threat.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Achieve Information Assurance Vulnerability Alert (IAVA) and Information Assurance Vulnerability Bulletin (IAVB) compliance via patch installation and management, and risk mitigation.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Use experience, analysis, and time management to work with a small team in planning and orchestrating the multi-faceted build of organizational structures and capabilities to provide risk mitigation and enable operational security.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Supporting security authorization activities in compliance with the NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes for security engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate experience in one or more of the following enterprise network management tools such as PaloAlto Panorama, SolarWinds, Cisco Prime, Cisco DNA, What's Up Gold, or Junos Space. Identify legacy service paths (i.e. dataflow, firewall rulesets, and ACLs) and develop strategies and designs for the to-be enterprise service capability to meet requirements while balancing security, sustainability, and maintainability.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support security planning, assessment, risk analysis, and risk management. Provide security planning, assessment, risk analysis, and risk management. As a Principal Information Systems Security Engineer (ISSE) with our Intel Division you will perform or review technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Information Assurance (IA) standards, and regulations and recommend mitigation strategies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Analyst assists with the identification and mitigation of risk posed to the confidentially, integrity, and availability of information systems. The Information Security Analyst ensure appropriate security controls are in place that will safeguard digital files and vital electronic infrastructure the system and network enterprise environments and uses technical knowledge and analytical skill to determine the optimum mix of technology, policy, procedures and education to implement effective information security programs and strategies.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in enterprise data strategy, data governance, data stewardship, data standards, and metadata management. Support the development and maintenance of data models, data dictionaries, data maps, and other enterprise-level architectural artifacts.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leidos is seeking a Microsoft Enterprise Engineer with strong expertise in operating systems and server hardware to join our Defense Enclave Services (DES) team at Ft. Meade, MD. Microsoft Intune – Endpoint Management & Software Distribution.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop, configure, and customize ServiceNow modules including Incident Management, Change Management, Problem Management, Asset Management, and Configuration Management.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist government technical leads with the implementation of a cloud-based architecture integrating multiple software applications - including Cameo Enterprise Architecture, Informatica Axon/EDC, Confluent Kafka, Tableau, KeyCloak, Red Hat OpenShift, and other custom applications.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate any changes or modifications to hardware, software, or firmware of a system with the ISSM and Authorizing Official (AO) risk mitigation statement prior to the change. Track, monitor and evaluate all related Information Assurance Vulnerability Management (IAVMs) through identification to closeout.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, Documentations, Identity Access Management (IAM), Privileged Access Management (PAM), Strategic Planning. Recognized as a Subject Matter Expert in privileged access management (PAM) with emphasis on CyberArk, Delinea, BeyondTrust.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintaining a complex server-based enclave, including performing system scans, vulnerability management activities, and active directory configuration. They will provide support for server/router/firewall configuration, and will perform security management and application performance optimization functions.
ExpandApply NowActive JobUpdated Today
enterprise risk management mitigation jobs in Castine, ME
FEATURED BLOG POSTS
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.