- UpvoteDownvoteShare Job
- Suggest Revision
As an Information System Security Manager (ISSM) for TCASS, your role is integral to the security and compliance of the organization's information systems, with a particular focus on Assured Compliance Assessment Solution (ACAS), the Risk Management Framework (RMF), and Security Technical Implementation Guide (STIG) tracking.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification strongly desirable, such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials is a plus.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP) or ISACA's Certified Information Security Manager (CISM) The U.S. Department of Homeland Security (DHS) Science & Technology Directorate (S&T) Office of the Chief Information Officer (OCIO) focuses on providing the tools, technologies, and knowledge products for the nation’s Homeland Security Enterprise.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GSEC: GIAC Security Essentials Certification - Global Information Assurance Certification (GIAC) Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Electronic security systems (including access control, CCTV perimeter security), information assurance, low voltage systems (including Telecom, A/V etc.) (Titles could include Project Manager, Construction Manager, Construction Superintendent, Engineering Manager etc.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Manager is responsible for managing clients and projects, assisting in compiling, and analyzing HIPAA (Health Insurance Portability and Accountability Act) documents and Protected Health Information/electronic Protected Health Information (PHI/ePHI), participating in site visits and interviews, performing reviews of PHI/ePHI technical environments, and testing to support various healthcare, testimony, arbitration services, litigation, investigative, and compliance projects.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The InfoSec Third Party Risk Manager manages, plans, and assesses oversight of information security controls. Defines work using agile frameworks and practices and in alignment with information security GRC outcomes.
$144,000 - $168,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Recent mid-career level experience in a national security-focused U.S. Congress office, or an office focused on legislative affairs in a national security-focused federal agency. Using the mapping and networking above, M/USGE will be responsible for collecting, collating, and sharing information related to business opportunities and market intelligence emanating from U.S. Congress, DoD, and other federal government stakeholders, with the goal of identifying or creating new opportunities, and identifying and mitigating risk to current programs.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Clearance: Top Secret/SCI. Education: Bachelor’s Degree in Cybersecurity, Information Assurance (IA), or relevant IT degree with a significant amount of coursework related to cybersecurity.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that testing processes and deliverables comply with federal government regulations and quality standards, such as the Federal Information Security Modernization Act (FISMA) and System Development Life Cycle (SDLC) methodologies.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain the Security Incident Guide in coordination with the Information System Security Manager (ISSM) Provide incident matrix to the Director of Security (DS) and Government SAP Security Officer (GSSO.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Clearance: Top Secret with Secret Compartmented Information (SCI) eligibility. Army Product Manager TENCAP responsibilities include support to Headquarters Department of the Army (HQDA) to maintain connections to national and theater systems; prototype development and transition of technology into Army systems; and acquisition of equipment as directed by the TENCAP General Officer Steering Group (TGOSG) and Assistant Secretary of the Army (Acquisition, Logistics & Technology) (ASA(ALT.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Protects the privacy of our consumer's protected health information by maintaining compliance with HIPAA and other relevant CC related IT security regulations. Each RS has responsibility, under the supervision of a licensed Clinical Manager (supervisor), for working directly with a caseload of 10-12 individuals while also participating in case sharing with all consumers assigned to the team.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
For Intermediate Level: Provides network environment (NE) and advanced level computing environment support to include perimeter controls, internal network monitoring, sensor implementation, and analysis under general supervision of a network manager.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Company Overview: At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers.
$71,500 - $150,200 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago
information security manager jobs in Alexandria, VA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?