- UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Cyber, security, vulnerability, STIG, RMF, Risk Management Framework, A&A, Assessment and Authorization, threat modeling, offensive, attack vector, defense-in-depth, DevSecOps, DSO, CI/CD, Pipeline, Containerization, AWS Cloud, Kubernetes, MBSE, Attack Vector, Attack Surface, Resilience, Survivability.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The ISSE will be responsible for the completion of Risk Management Framework (RMF) requirements and implementation. Support other cybersecurity processes like Command Cyber Risk Inspections (CCRI) events, Web Risk Assessments, etc.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This effort also includes the benefit of serving as an integrated solution provider to support the TRADOC DCS G6 as it executes the Armys directives for cloud migration, data center consolidation, data management, portfolio management, risk management framework, and information system continuous monitoring.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead Assessment and Authorization (A&A) activities for DoD Systems in accordance with Risk Management Framework. Develop and assess Body of Evidence documentation including but not limited to, system security plans, security CONOPS, risk management matrix, security control traceability matrix, security test procedures, and plan of action and milestones.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will work with the Information System Security Manager (ISSM) to maintain Authority to Operate (ATO) approvals for various systems by adhering to the Risk Management Framework (RMF.
$52 an hourExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with the review and creation of mitigation reports from compliance and vulnerability scanning tools (Nessus, SCAP, etc. Able to interface with other IA team members, other security disciplines (industrial security, physical security, special programs security, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of information security management and compliance. Experience with compliance and vulnerability scanning tools (Nessus, SCAP, ACAS, SCC). Experience with the preparation of Assessment and Authorization (A&A) documents and procedures.
$50.74 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support the ISSM to ensure all security certification and accreditation documents in relation to assigned systems are up-to-date. Experience with compliance and vulnerability scanning tools (Nessus, SCAP, etc.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong organizational skills Able to interface with other IA team members, other security disciplines (industrial security, physical security, special programs security, etc.) This position supports cybersecurity efforts throughout the RMF process for one or more assigned programs(s) to include the enforcement of System Security Plans, Plans of Action and Milestones (POA&Ms), assessing and auditing systems security controls.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As an ISSO, you will support adherence to rigorous Risk Management Framework (RMF) compliance programs and ensure Authority to Operate (ATO) approvals for various systems. As an ISSO, you will support adherence to rigorous Risk Management Framework (RMF) compliance programs and ensure Authority to Operate (ATO) approvals for various systems.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Due to the nature of the work being performed US Citizenship is required Job Title: Information System Security Manager. Because of the need for consistent, in-person collaboration and/or the requirement to perform all work onsite due to the nature of this role, it will be performed full-time on site.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You'll collaborate closely with the Information System Security Manager (ISSM) to enforce security plans, assess system controls, and uphold cybersecurity efforts throughout the RMF process. Our client is seeking an Information System Security Officer (ISSO) to play a pivotal role in maintaining the security and integrity of their information systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Third Party Risk Manager will be responsible forimplementation of third-party risk management framework for Emprise Bank including oversight of vendor relationships and contract governance , identification and implementation of due diligence requirements, identification and administration of MRM requirements and operational & infrastructure implementation to support strong third-party oversight.
RemoteExpandApply NowActive JobUpdated 8 days ago
FEATURED BLOG POSTS
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
What is Talent Mapping
Every planner and recruiter knows that each strategic process requires a pre-strategic process. This is usually just the pre-planning phase of your master plan. Because hiring and recruiting involves many aspects of business (budgets, time, employees, planning, etc.), it is important to ask yourself a few questions to evaluate what resources you have to fulfill your hiring needs. These questions include:
How to Take Your Careers Page to the Next Level
Your careers page deserves a lot of attention. It is not just another page on your website. It is a vital tool that could enhance your recruitment outcomes. But in order to do that, you have to make sure it's fully optimized.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,