- UpvoteDownvoteShare Job
- Suggest Revision
Create threat assessment reports for all countries identified to be included in the mission as provided in the mission tasking. MELE's services include national security, intelligence, law enforcement and emergency response training, IT/cybersecurity, facility management and engineering, CBRNE defense and nuclear security, and mission and program support.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist with informing and tuning the development of threat management strategies, as well as assessment instruments used to identify potential risk behaviors indicative of an insider threat.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience in Information Security (INFOSEC); computer security; cryptography; network security; assessment and authorization; incident response investigations; risk analysis; threat and vulnerability scanning, analysis, and management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
5 or more years of experience with information security including threat detection/mitigation, vulnerability management, user awareness, email firewall security, identity/access management, endpoint protection, firewall/IDPS security, auditing and risk assessment, incident response, data loss prevention, and policy development.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborating with internal and/or external cybersecurity professionals and experts in cybersecurity risk assessment/management, automated information sharing, threat analysis, vulnerability management, and network defense/network protection to assess risk, identify vulnerabilities and implement controls as necessary.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Arlo Solutions is in search of an Assessment Coordinator for the Joint Management Office for Insider Threat and Cyber Capabilities (JMO-InTCC) position in support of the OUSD I&S CL&S Support Division.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Education or previous work experience in risk assessment, simulation and modeling and/or CBRN threat characterization. A technical background in science, engineering, or CBRN is not required so much as a strong grasp on program and project management fundamentals and a deep desire to develop and maintain project processes, build documentation and portfolio strategy, and an eagerness to learn the field.
$90,300 - $158,000 a yearPart-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities:Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerability management, risk management, information assurance, penetration testing, cybersecurity services, and Security Assessment and Authorization (SA&A) documentation.
$101,400 - $183,300 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Serving as the senior authority in Unified Asset Management (UAM) and insider threat mitigation, this role leverages extensive expertise to develop tailored solutions and best practices across various assessment tasks.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintains network device and information security incident, damage, and threat assessment programs. Requires a bachelor's degree in information technology, Computer Science, Mathematics, Statistics, Business Engineering or Physical Science and 10 years of general experience in any of the following areas: complex problem solving, software, systems, business processes, cyber security, network, hardware installation, network management, enterprise communications, information assurance, system administrator or data standardization.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborates with various OCIO components to develop and evaluate security policies, including incident response, identity management, and insider threat prevention and detection. Managing or assisting an IT contract management program with experience in areas such as Business Process Re-engineering, Capital Planning and Investment Assessment, Contracting/Procurement, Cost-Benefit Analysis; AND.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support Assessment and Authorization (A&A) cybersecurity reviews, identify gaps, and support risk management plans for cybersecurity personnel to execute. Experience reviewing and developing of RMF Assessment and Authorization (A&A) documentation, e.g., System Security Plans (SSPs), Security Assessment Reports (SARs), and Plans of Action and Milestones (POAMs.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
O 3 years of experience is required with vulnerability assessment and reporting with an comprehensive understanding of vulnerability management methodologies and procedures, threat assessment, and remediation management.
ExpandApply NowActive JobUpdated 6 days ago
threat assessment management jobs in Mclean, VA
FEATURED BLOG POSTS
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.