- UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will assist the Information System Security Officer (ISSO) in assessing program security effectiveness and hardware and network systems' compliance.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience. Familiarity with: Zero Trust Network Access (ZTNA) and Secure Access Service Edge (SASE) frameworks, Identity, Credential, and Access Management (ICAM) (OKTA), Cloud Workload Protection Platform (CWPP), Security Operations Center (SOC) Operations, Vulnerability Threat Management, and Compliance.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Desired experience Risk Management Framework (RMF), Cybersecurity Framework (CSF), Federal Information Security Modernization Act (FISMA), and FedRAMP experience. Applicants selected will be subject to a government security investigation and must meet eligibility requirements for access to classified information and be able to obtain a government-granted security clearance.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Services we typically provide include security and safety system design, threat, risk, and vulnerability assessments, security surveys, security master planning, compliance to federal security programs, independent validation and verification of integrated security system operations, management of installation and maintenance, and staff augmentation to develop and implement facility management and protection processes.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide high-level technical leadership in risk assessments, implementation, and operational aspects of information security procedures and products. Mastery of California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA), Payment Card Industry Security Standard (PCI DSS), California Data Breach Notification Laws, California Information Security Office (CISO) Policies and Guidelines and other relevant data and cyber security standards and requirements.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information risk, privacy, and strategy (i.e. security and privacy policies, or risk assessments, or security and privacy compliance); We blend risk strategy, digital identity, cyber defense, application security, and managed service solutions to rethink the entire security lifecycle.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have the ability to monitor and mitigate issues that may be identified as a result of Information Assurance Vulnerability Alerts (IAVAs), Information Assurance Vulnerability Bulletins (IAVBs), Assured Compliance Assessment Solution (ACAS) Scans, and other system performed security tests.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Centurion Consulting Group is looking for Cybersecurity Auditor for a remote-telework position that supports our client's governance, risk, information assurance and compliance (GRIA&C) arm of the cybersecurity team.
RemoteExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The GRC Specialist assesses and prioritizes information security and cybersecurity risk across the organization, facilitates compliance with regulatory requirements and information security policies, and develops and reports on information security metrics.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As Security Officer, performs electronic information security risk assessments and serves as the internal auditor for electronic information security processes.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Compliance Specialist II position plans, develops and maintains cyber security policy and plans for classified or proprietary materials, products, services, electronic documents and information systems.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Communicate: Develop executive-level communications using a variety of approaches to meet the needs of many stakeholders in an efficient, scalable manner to reach enterprise-wide representatives from Business Risk, Compliance, and Information Security Services as well as all leadership and teams within the talech business area; this requires expert-level use of PowerPoint, Confluence, visual-based collaboration tools such as Visio and Mural, and more.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with system administrators, engineers, and Information System Security Manager (ISSM) to create or update system/site policies, procedures, and process guides. Provide internal assessments and audits of security controls implemented on client's information technology assets.
RemoteExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Data Loss Prevention (DLP) systemsEncryption technologies and standardsEndpoint security softwareGovernance, Risk, and Compliance (GRC) systemsIdentity and Access Management (IAM)Incident response practicesNetwork security (e.g. firewalls, IDS/IPS, VPN, etc.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You will engage with key decision-makers, including Chief Executive Officers (CEOs),Chief Financial Officers (CFOs),Chief Risk Officers (CROs),Chief Audit Executives (CAEs),Chief Compliance Officers (CCOs), Chief Information Security Officer (CISOs), Chief Technology Officers (CTOs), Internal Audit Directors/Managers and other financial leaders, to understand their needs, future plans, and desire for change.
ExpandApply NowActive JobUpdated 3 months ago
risk and compliance information security jobs in Kansas City, MO
FEATURED BLOG POSTS
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are