- UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A good appreciation of the NIST CSF and audit processes is desirable and ideally you will have an appreciation of asset management principles. As our lead security risk analyst, you’ll drive the strategic direction for the system level risk identification, management, and review for one of ET’s most critical networks – the Operational Technology Services Network (OTSN.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Skills in vulnerability assessment, penetration testing, and security incident response. We have extensive experience in the fields of cybersecurity, development, IT infrastructure, supply chain management and other professional services such as system design and continuous improvement.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Support Risk Management Framework (RMF) Assessment and Authorization (A&A) processes leading to successful Authority to Operate (ATO) decisions. Exposure to other network monitoring systems and IT Service Management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with DevSecOps , CI and CD, IaC and CaC, IT Infrastructure Library, and IT Service Management. As a Sr Cyber Engineer and assured, compliance, assessment, and solution (ACAS) SME on ourteam, you’ll be able to work individually or in a small integrated team, and lead a task, project, or team.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain Coca-Cola’s Industrial Controls Systems (ICS)/Operational Technology (OT) Security Standard and Risk Assessment process. A firm understanding of information assurance principles and organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation), IT supply chain security/risk management policies/requirements/procedures, and IT security principles and methods, such as firewalls, demilitarized zones, and encryption and network security architecture concepts including topology, protocols, components, and principles (i.e., application of Defense-in-Depth.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience steering packages through all stages of the Risk Management Framework (RMF) process and developing artifacts including security assessment plans, systems security plans, and plans of action and milestones.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vulnerability Assessment: Conduct regular vulnerability assessments and penetration testing to identify potential weaknesses and implement necessary security measures. Threat Intelligence: Stay abreast of the latest cybersecurity threats and trends, ensuring the organization's security strategies and practices are up-to-date and effective.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Function as a subject matter expert of IT security concepts, including vulnerability management, risk assessment, incident response, cloud security, and threat detection. Experience implementing information security principles and risk assessment techniques.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
RMF assessment and authorization process. Monitor and assist in the assessment and review of systems and networks within the environment to identify where systems/networks deviate from acceptable configurations, enclave policy, and local policy.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support scheduled OMC Command Cyber Readiness Inspections (CCRI), and security assessment visits (SAV). This support is inclusive of all efforts associated with the Risk Management Framework (RMF) activities.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Must have a Bachelor’s degree in Management Information Systems (MIS), Computer Science, Engineering, Business, Accounting, Finance or a related field and 5 years of progressive, post-baccalaureate combined experience in consulting, advisory, cybersecurity assessment, or auditing.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include: System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Plan, Security Assessment Plan, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KBR is seeking a highly motivated self-starter, adaptable to a fast-paced and challenging environment as a cybersecurity engineer in the Air Force Life Cycle Management Center (AFLCMC) who can work independently and as a team contributor supporting multiple stakeholders.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of Assured Compliance Assessment Solution (ACAS) and other container scanners such as Trivy, Twistlock, or Palo Alto. Knowledge of network access, identity, and access management (e.g., PKI.
ExpandApply NowActive JobUpdated 7 days ago
threat assessment vulnerability management jobs in Greendale, WI
FEATURED BLOG POSTS
Internal Recruiting: Benefits and 5 Internal Recruiting Methods to Consider
Internal and external recruiting are nearly the same thing. The biggest difference is where candidates are sourced. There are instances where external recruiting may be the best option. However, when you are presented with the opportunity to recruit internally, you should take full advantage of the different internal recruiting methods. Initially you will find that the hiring process gets a little bit easier. Then you'll notice all the other benefits that internal recruiting offers.
How to Answer the Interview Question: What is Your Communication Style?
As a job searcher, you probably have so many questions about job searching. However, once you've landed an interview, your excitement takes your questions to a whole new level. What will you wear? Will you know how to answer all the questions? Have you practiced giving nice firm handshakes?
What Makes a Company a Great Place to Work
After one too many after-hours emails, you’re on the hunt for a new gig. But what makes a company a great place to work? And how will you know when you find one? Finding a motivating, safe, and productive work environment is important for our mental and physical health. If you’re financially frustrated, creatively stuck, or just plain over it, it’s time to find a healthier workplace where you can flourish.
What Makes a Good Boss? The Top 12 Qualities & Attributes
Think back to the best boss you’ve ever had—does someone come to mind? We hope so! Okay, now think back to the worst boss you’ve ever had. I’m sure you can conjure up a few faces.
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
How Does Temp to Hire Work? Benefits, Concerns, & More
Whether you’re just starting out your career or are looking for the next opportunity, the job market has never been more burgeoning with opportunities. From flexible work options and freelancing gigs to seasonal and temp-to-hire work, people today are spoiled for choice when it comes to finding engaging and fulfilling work.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.