- UpvoteDownvoteShare Job
- Suggest Revision
At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Cyber Security. You will lead the execution of HVA assessments which include penetration testing services using a variety of tactics, techniques, and procedures to identify exploitable vulnerabilities in networks and systems while also measuring compliance with organizational security policies, testing whether staff are aware of security issues, and ultimately determining the organization's risk to cybersecurity threats.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our core offerings are Risk Intelligence, Resilience Advisory, Crisis Preparedness and Response, and Cyber Security Risk Management. Independently produce high-quality corporate security and resilience deliverables such as threat, risk, and vulnerability assessments, threat intelligence briefings, corporate security and security programs, and corporate standards, policies, and procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Access Control, Application Security, Business Continuity and Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Legal Regulations, Compliance and Investigations, Operations Security, Physical (Environmental) Security, Security Architecture and Design, Telecommunications and Network Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Threat Hunter will serve as a hands-on-keyboard team member of the Incident Response/Hunt team that will perform Incident Response and Threat Hunting activities on the TikTok enterprise network to include emergency response to cyber incidents as well as continuous and targeted threat hunting.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Industry standard certifications such as CEH Certification, Security +CE, or GIAC Cyber Threat Intelligence (GCTI). IAT Level III Certification (CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP) or CSSP-SPM.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead Defense Counterintelligence and Security Agency (DCSA) Security Vulnerability Assessments (SVA), Command Cyber Readiness Inspections (CCRI) and Other Government Agency (OGA) inspections.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Conduct Cyber Open-Source Intelligence (C-OSINT) AND Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients. Relay cyber threat information to the Security Operations Center and Vulnerability Management Team to help prevent the exploitation of threats in the future.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of and experience with standard network logging formats, network management systems and network security monitoring systems, security information and event management, network packet analysis tools, and forensic analysis tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate is expected to bring pragmatic risk-based technical security controls management experience allowing the IMF to meet its present and emergent business needs while staying within the boundaries of the IMF's cyber risk tolerance.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will help set up, operate, and manage/maintain a variety of security solutions including vulnerability management, endpoint security, security information and event management, and governance/risk/compliance.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience designing or building Cyber Risk Management, Third-Party Risk Management (TPRM), Supply Chain Risk Management (SCRM), or GRC Programs. 2+ years of experience with cyber risk management frameworks and methodologies, such as FAIR, NIST RMF, or COBIT.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Sev1Tech is seeking an IT Service Management (ITSM) Business Analyst to join our Network Operations Security Center (NOSC) team on a program supporting the Department of Homeland Security (DHS)'s network and security operations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Apply technical expertise to perform technical and nontechnical system evaluations, network and application security reviews (including RMF), identify gaps in security architecture, recommend risk acceptance, and develop a security risk management plan.
$150Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Cyber Analyst will be responsible for supporting the technical implementation of the Risk Management Framework (RMF) Assessment and Authorization (A&A) services. Network Mapping and Vulnerability Scanning: Familiarity with network mapping, vulnerability scanning tools (e.g., ACAS, Nessus), and Security Technical Implementation Guides (STIGs) and Security Requirement Guides (SRGs.
ExpandApply NowActive JobUpdated Today
network security cyber risk jobs Title: senior in Washington, MD, Nebraska
FEATURED BLOG POSTS
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.