- UpvoteDownvoteShare Job
- Suggest Revision
Verify insurance information is complete prior to procedure and collect and verify pre-authorization/referral information: goal is to obtain authorizations 5 days in advance of service.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that projects are fully consistent with MIGA's ex-ante development impact assessment framework and sound economics and policy and are aligned with the programs and objectives of the World Bank Group (WBG) and the IMF in these countries.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Create and update DoD RMF products including Security Assessment Plan (SAP) and Security Plan for the Assessment and Authorization (A&A) of new and existing submarine systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead investigations, incident response (IR), and cyber threat intelligence (CTI) engagements. 6+ years digital forensic, incident response, and investigative experience; 2 years of management and supervisory experience.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Overseeing cyber threat intelligence, and incident management, digital forensics, and investigations, alongside championing innovation in cybersecurity practices to achieve operational excellence and deliver value promptly.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability assessment and reporting including comprehensive understanding of Vulnerability Management methodologies and procedures, threat assessment, and remediation management.
$83,550 - $178,603Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with SIEM, intrusion detection and prevention systems (IDS/IPS), threat intelligence platforms and security orchestration, and automation and response (SOAR) solutions to centralize and manage incident and remediation workflow.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead with the development of a client-approved threat intelligence program and in coordination with associated departments in incident response and network engineering. Conduct Cyber Open Source Intelligence (C-OSINT) and Social Media Intelligence (SMI/SOCMINT) exploitation, link and network analysis investigations for high intel threat clients.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for the Cybersecurity program as stipulated by various US Government requirements including (but not limited to): Joint Special Access Implementation Guide (JSIG), National Industrial Security Operating Manual (NISPOM), and the DCSA Assessment and Authorization Process Manual (DAAPM.
$130,000 - $170,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include: System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Plan, Security Assessment Plan, etc.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Director supervises an Instructional Designer, Faculty Canvas Support Specialist(s), and a Faculty Assessment Coordinator. Supervises and manages Center faculty and staff, such as the Instructional Designer, Faculty Canvas Support Specialist(s), and Faculty Assessment Coordinator.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possesses one of the following professional security and management certifications: CISSP, CASP, CISM, CEH, SSCP, CAP, CISA, GISP, PMP certification. The ideal candidate is a creative and hands-on leader, with technical expertise in large-scale information security program modernization, DevSecOps and digital transformation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reconcile schedules for upcoming clinic session to include ensuring that accounts are set up for billing and services requiring authorization are flagged: Activity should be completed 3-4 days in advance of clinic session; Areas with procedures requiring authorizations work standard may be 5-7 days.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Create, maintain, and enhance Incident Management, Problem Management, Service Request Management, Service Catalog, Knowledge Management, Self-Service Portals, single sign on (SSO) capability, and Active Directory Profile synchronization.
Full-timeExpandApply NowActive JobUpdated Today
incident assessment and authorization jobs Company: Solutions Llc in Arlington, VA
FEATURED BLOG POSTS
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
Decline a Job Offer Professionally: When to Rescind
Your job search has finally paid off! After countless job applications, numerous emails, and several interviews, the hiring manager and other stakeholders have decided that you’re the right person for the job! All you have to do now is accept the offer and walk into the sunset, right?
Resume Job Description Samples - 8 Tips to Follow
When looking for a job, your resume becomes a crucial element. From making a great first impression to showcasing all your achievements and potential, your resume has to portray your professional story in minutes.
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?