- UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position serves as the Information System Security Officer (ISSO) for the corporate headquarters office at CNA. The position is responsible for assisting the Information System Security Manager (ISSM) in maintaining risk management framework (RMF) network systems across CNA. The ISSO will also maintain multi-user standalone systems and other local networks supporting two or more components of overall Information Technology systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working with the Facility Security Officer (FSO) develop, implements and manage a formal Information Security / Information Systems Security Program. The Information Technology Team Manager is the primary Information Technology (IT) decision maker and responsible for the management and technical administration of the Information System (IS) in accordance with internal and external security requirements.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
U.S. citizenship is required, as only U.S. citizens are eligible for a security clearance Typically requires BS/BA Degree in Science, Technology Engineering Math (STEM) in Computer Science, Computer Engineering, Information Technology or Physics and 8+ years of related work experience Experience with Agile Development Methodologies (E.g. scrum, SAFe) Experience with programming languages (E.g. Python, Java, Ruby, Bash, C.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lab Manager II - Technical Engagement Network (TEN) Argo Cyber Systems is supporting a U.S. Government customer to provide support for onsite incident response to civilian Government agencies and critical asset owners who experience cyber-attacks, providing immediate investigation and resolution.
$65,000 - $80,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Vision: Develop and evolve a comprehensive cybersecurity strategy that aligns with DARPA's mission, technological landscape, and evolving threat environment, utilizing your experience mapping critical information systems to business objectives and ensuring security through process resiliency.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking an Information Systems Security Manager (ISSM) II to help contribute to our success and help us solve problems with innovation through intelligence. Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest systems, interconnected system with another organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications such as AWS Certified Solutions Architect or Certified Information Systems Security Professional (CISSP) Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our work depends on a Senior Change Manager joining our Joint Strike Fighter (JSF) F-35 IT program in Arlington, VA. The Joint Strike Fighter (JSF) F-35 IT program support contract provides knowledge-based, information assurance and cybersecurity IT services to the F-35 JSF Virtual Enterprise (JVE) unclassified network in support of the F-35 Lightning II Joint Program Office (JPO.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The ISSM's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under his/her purview. Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s Degree in an Information Technology related discipline and/or current, applicable industry-standard certifications (MCSA, CCNA, Security+, RHCSA). Minimum of 3 years working as a Windows System Administrator, Linux Systems Administrator, Network Administrator or similar role.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional Certification: Must have and maintain one or more of the following IAT Level III certifications: Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), CompTIA Advanced Security Practitioner (CASP+) certified or other cyber security professional certifications and relevant information security technology expertise.
Full-timeExpandApply NowActive JobUpdated 2 months ago
information systems security manager network jobs in Arlington, Woods-cross, Utah
FEATURED BLOG POSTS
When to Tell Your Boss You're Job Searching
The Bureau of Labor Statistics has found that individuals, on average, have 12.4 jobs throughout their working life. So regardless of where you are on the career ladder, it’s inevitable that at some point, you’ll begin looking for another job. That said, you might be wondering,
What Questions Can You Not Ask in an Interview?
It can be stressful to interview candidates to fill an open role at your company. Maybe your boss is on you to hire someone who’s absolutely perfect as soon as possible. Maybe you don’t have a ton of experience yet in conducting interviews. Whatever the case, there’s a lot to take under consideration when you’re the one in charge of interviewing. For instance, “What questions can you not ask in an interview?” may very well be running through your mind given its legal ramifications. Knowing exactly which interview questions are off-limits (and which are fine to ask) will boost your confidence as you continue to search for the ideal new hire.
How to Prepare to Be Fired - What You Need to Do
If you’re reading this, let me be the first to tell you how sorry I am. Getting fired feels crappy, disheartening, hurtful, and all the other bad, sad words. But here’s what I want you to do. First, let yourself fumble for a minute. Then, pick your head up — sometimes getting fired is a blessing in disguise. If you think termination is around the corner, we’ll teach you how to prepare to be fired and what to do next so you land somewhere even better.
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.