- UpvoteDownvoteShare Job
- Suggest Revision
URT1 Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CGI Federal is hiring a Quality Assurance Analyst SME to work with a skilled and motivated team of professionals on a high-visibility Department of Homeland Security (DHS) Cybersecurity and Infrastructure Security Agency (CISA) cyber security program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking an energetic, self-motivated Audit Director interested in becoming part of our Audit team to serve as a leader for our assurance over a global payments network, platforms, technologies, and related operations (e.g., credit/debit processing, digital payments, acquiring, servicing domestic/abroad, settlement operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The National Security Sector of Leidos has a career opportunity for a talented Quality Assurance Manager to support a program in the Decision Advantage Solutions Business Area. This position serves as the member of a team with the responsibility to ensure the highest quality service is provided to our customer through the generation and control of program processes, performance of regularly scheduled internal process audits and the consistent facilitation of structured improvement activities.
$68,900 - $124,550 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You understand and track key metrics on security, resilience and performance for your product (s) and understand levers that drive these metrics. Proactively identify opportunities when key metrics on security, resilience and performance for your product (s) are not performing.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, configure, implement, troubleshoot, and maintain all security platforms and their associated software, such as firewalls (Security Groups), intrusion detection/intrusion prevention, anti-virus/malware (HBSS), cryptography systems (Vormetric), SIEM (Splunk), and MDM.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Contractor shall maintain a document repository using the security tool to include but not limited to XACTA, ServiceNow. The Contractor shall utilize COTS and GOTS applications to include but not limited to Nessus, Rapid 7, WebInspect, and AppDetective to review, monitor and track system environments to identify vulnerabilities, non-compliance with established information assurance standards and regulations, and recommend mitigation strategies.
$150ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
StackArmor provides FedRAMP, FISMA/RMF, and CMMC/DFARS compliance acceleration services on AWS, Azure and GCP. stackArmor’s ThreatAlert Security Platform reduces the time and cost of an ATO by 40.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information; TS/SCI clearance with polygraph is required.
$75,600 - $172,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The FSO is a specialized position for supervising, managing and administering the DoD or other government security programs at ATSC. They are responsible for ensuring compliance to the corporate and government security policies and for the safety and security of ATSC personnel, materials, and classified or confidential business documents.
ExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with the Red Team to integrate web application penetration testing findings into broader threat emulation scenarios and organizational security assessments. We are seeking an Information Security Tech Lead to assist the team by providing subject matter expertise in Penetration testing of Infrastructure and Networks, Web Applications, Cloud and Social engineering, and Purple Team. In this role, the candidate will provide enhanced vulnerability analysis and contextual feedback to stakeholders to support the resolution of discovered vulnerabilities and facilitate risk awareness.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We provide these servicesacross many sectors including, but not limited to, agriculture, resilience & food security, conflict & crisis, democracy & governance, economic growth & trade, education, energy & Infrastructure, environment & climate change, global health & WASH and humanitarian and disaster assistance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Research Associate Professor provides leadership in workforce development research, especially in the national security space to the College of Engineering and Computing (CEC). Advises the Associate Dean for Research (ADR) on workforce development research strategy, especially as it relates to national security, and performs other duties commensurate with the incumbent's skills, abilities, and seniority that may be assigned by the ADR based on the dynamic and evolving nature of CEC.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Alternatively, at least 2 years experience working as a Security Analyst, preferably utilising SIEM or endpoint security applications in a Threat Detection and Response focussed role.
ExpandApply NowActive JobUpdated Today
hiring safety and security assurance jobs Title: supervisor Company: Red Hat in Fairfax, VA
FEATURED BLOG POSTS
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: