- UpvoteDownvoteShare Job
- Suggest Revision
Our client is looking for a Information Security Engineer to join their team. DESIRED QUALIFICATIONS/EXPERIENCE: Bachelor's degree in Information Technology or a related technical field with a minimum of two years of experience in a Cybersecurity role.
$58 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with at least one of the following scanners: Nessus, Security Content Automation Protocol (SCAP), or SteelCloud ConfigOS. Proven experience in cybersecurity or information assurance roles.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Systems Manager is responsible for the implementation of Information Technology (IT) in the hotel in accordance with Hilton’s IT strategies and priorities, as well as measuring IT costs, benefits and performance in the hotel and providing this information to hotel management and the Regional Information Systems Manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This effort will require collaboration and integration between internal and external stakeholders encompassing virtual design and construction (VDC) and Building Information Management (BIM). Assist and undertake development efforts necessary to ingest data into and deliver (both graphical and non-graphical) information from the CDE to satisfy project data centric execution objectives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 5 years of working experience as a Scrum Master or Release Train Engineer. Significant working experience as a Scrum Master or Release Train Engineer. We do not discriminate or allow discrimination on the basis of race, color, religion, creed, sex (including pregnancy, childbirth, breastfeeding, or related medical conditions), age, sexual orientation, gender identity, national origin, ancestry, citizenship, genetic information, registered domestic partner status, marital status, disability, status as a crime victim, protected veteran status, political affiliation, union membership, or any other characteristic protected by law.
$65 - $70 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred:Experience with using and configuring Aqua SecurityWorking knowledge of container security concepts, threats, and mitigationsCurrent information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM.
$83,550 - $178,603Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least one: Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Authorization Professional (CAP) or CompTIA Advanced Securi.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You will support the Headquarters Department of the Army (HQDA) Office of Deputy Chief of Staff (DCS) G-2 Information Management (IM) Directorate, otherwise known as Department of the Army Military Intelligence – Information Management (DAMI-IM), Chief Information Officer (CIO) in this important role.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identify contractor personnel and qualifications to support the functions of the PEO IWS Activity Chief Information Officer (CIO) and the Enterprise Architect supporting the ACIO team. Assist the NMCI/NGEN Chief Information Officer (CIO) for PEO IWS by reviewing and reporting on the compliance of information systems policies, certification, and accreditations.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in Business Administration, Computer Science, Engineering, Remote Sensing, Photogrammetry, Image Science, Data Science, Information Technology, Management Information Systems, Geographic Information Systems, Geography, or other related degree program or equivalent Senior Level experience as a Functional Specialist.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Insider Threat Analyst, you will be part of Cyber Security Operations & Intelligence at Freddie Mac and will help carry the Information Security department’s vision of reducing information risk by ensuring and enhancing the confidentiality, integrity and availability of information.
$85,000 - $127,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Company Information: Cherokee Nation System Solutions (CNSS) is a part of Cherokee Federal - the division of tribally owned federal contracting companies owned by Cherokee Nation Businesses. Combination of Federal IT and auditing in the following with a minimal of two (2) certifications- one in Information Technology technical area certifications in the following: Certified Information Security Auditor (CISA), Certified in Risk and Information Systems Control, Certified Internal Controls Auditor, Certification in Risk Management Assurance (CRMA), or similar certification related to IT testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Indicators of Compromise (IOC)s will be obtained through: forensic analysis of digital information, Open-Source Intel (OSINT) review/monitoring, available tools both customer provided and open source, and pivoting/researching on previously reported IOCs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Director of CSG is dual-hatted as the IC Chief Information Security Officer (IC CISO). The CSG Senior Information System Security Manager (ISSM) involves ensuring the confidentiality, integrity, and availability of systems, networks, and data through planning, analysis, development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures, and tools.
$139,395 - $191,900 a yearFull-timeExpandApply NowActive JobUpdated Yesterday
information job Title: scrum master Company: Home Depot in Mclean, VA
FEATURED BLOG POSTS
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.