- UpvoteDownvoteShare Job
- Suggest Revision
Senior Cloud Security Specialist -Remote –Washington, DC.About usCreative Information Technology Inc (CITI) is an esteemed IT enterprise renowned for its exceptional customer service and innovation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, a typical day will include providing support to the DoS DT/ES/CCS IT Security Manager, Information System Security Officers (ISSOs); responsible for new and existing systems, applications, and networks, both on-premise and/or within a Federal Risk and Authorization Management Program (FedRAMP) cloud.
$149,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We have responsibility to ensure operational IT capabilities provide the client with necessary timeliness, accuracy and security of information demanded from all our highly professional roles.
$166,750 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SPA is seeking an experienced national security risk analyst (CFIUS or Team Telecom) to support the Department of Homeland Security (DHS) and its involvement with the Committee on Foreign Investment in the United States (CFIUS) and the Committee for the Assessment of Foreign Participation in the United States Telecommunications Services Sector (also known as Team Telecom.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager is a critical member of the IT Security Risk and Compliance team and will be responsible for a team of senior security experts providing security platform management or global security systems, third party risk management, security consulting, and to prevent or reduce cyber risks that could impact business operations.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At a high level, the SBA Information Technology (IT) ecosystem consists of one preponderant 20,000 node Multi-Protocol Label Switched (MPLS) infrastructure, two on-premises data centers, and approximately seventy smaller field offices; and additionally utilizes resources from numerous cloud providers.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Network Security Engineer/Architect (Meraki) Ensure the implementation and management of the latest security protocols, including WPA3 and 802.1X for robust wireless authentication, enhancing network access control and security.
$95 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with GRC (Governance, Risk, and Compliance) systems or ITRM (Information Technology Risk Management) systems. Education Level: Bachelors degree in computer science, Cyber Security, Information Technology, or related field OR lieu of a Bachelors degree, an additional 4 years of relevant work experience is required in addition to the required work experience.
$177,749 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our client is looking for a Information Security Engineer to join their team. Actively participate in the company's Security Awareness Program by providing guidance, conducting IT and staff training, simulated phishing campaigns, and reporting.
$58 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partnerships of particular importance will include: Cyber Incident Response Team (CIRT), Threat Intelligence TI), SIEM engineering, SOAR development team, and Security Engineering, Security Architecture, GRC/Risk Management, and GRC/Compliance.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
They are expected to be an expert in two or more Information Security related subject areas (e.g., identity and access management, web application security, penetration testing, cloud security, network security, secure code development, encryption, mobile application security, systems, and platform security, etc.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s Degree in an Information Technology related discipline and/or current, applicable industry-standard certifications (MCSA, CCNA, Security+, RHCSA). Familiarity with classified information system Cyber Security tools and technologies (Nessus/ACAS, SCAP Compliance Checker, DISA STIGs.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop training materials based on Federal and Department-wide cybersecurity policies and standards, strategies, and frameworks, including the Cybersecurity Risk Management Framework (RMF), NIST Artificial Intelligence (AI) RMF, Machine Learning, Robotic Processing Automation, Systems Engineering Life Cycle (SELC), Secure Development and IT Operations, and the Cybersecurity Acquisition Lifecycle Framework (Cyber ALF.
$130,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimal of one (1) certification– in Information Technology technical area certifications in the following: Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Control, Certified Internal Controls Auditor, Certification in Risk Management Assurance (CRMA), or similar certification related to IT testing.
Full-timeExpandApply NowActive JobUpdated 5 days ago
network security it information technology risk jobs Title: engineer vulnerability management in Arlington, VA
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.