Key ResponsibilitiesManage services for Managed Security Service customers, including threat assessment and remediationDevelop Standard Operating Procedures (SOPs) and conduct threat intelligence gath...
read moreKey ResponsibilitiesManage services for Managed Security Service customers, including threat assessment and remediationDevelop Standard Operating Procedures (SOPs) and conduct threat intelligence gath...
read moreKey ResponsibilitiesManage services for Managed Security Service customers, including threat assessment and remediationHandle internal and client escalations, engaging with key stakeholders and follow...
read moreKey ResponsibilitiesLead the research and development of information security policies and technical baselinesCommunicate policy outcomes to senior leadership and negotiate details with subject matter...
read moreDemonstrated knowledge and experience to conduct established Federal Government standards for investigations, BIs, and security investigations relating to suitability and security standards. Provides ...
read morePreferred SkillsAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Techno...
read morePreferred SkillsAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Techno...
read moreEvergreen Fire and Security (EFS) is a recognized leader in the life safety and security solutions industry. This opportunity as a Traveling Security Specialist Technician is perfect for an experience...
read moreThe Security Master team plays a key role in ensuring the accuracy and integrity of security data on the Argent Platform. Trust Operations Specialist – Security Master. The role of Trust Operati...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreSupports Security team or leads efforts involving various miscellaneous security forms and logs. Industrial Security Letters, and procedures necessary to maintain current compliance. Assist the FSO in...
read moreSupports Security team or leads efforts involving various miscellaneous security forms and logs. Supports and works with on-site contractor Security Officer staff as directed by the Facility. Industri...
read moreThe Opportunity This opportunity as a Traveling Security Specialist Technician is perfect for an experienced low-voltage technician who enjoys traveling! The Responsibilities Installs, repairs, t...
read moreThe Opportunity This opportunity as a Traveling Security Specialist Technician is perfect for an experienced low-voltage technician who enjoys traveling! The Responsibilities Installs, repairs, t...
read morePerform web site security validations with approved website scanning tools for web & information servers IAW applicable references.
Perform web site security validations with approved website scanning tools for web & information servers IAW applicable references.
The incumbent performs the functions of teh Communications Security (COMSEC) Manager. Administers Communications Security/Secure Internet Protocol Router Network (COMSEC/SIPRNET) Cryptographic equipme...
read moreCAP, CND, Cloud+, GSLC, Security+ CE: IT eLearning COMPTIA, FED-VTE, Skillsoft preferred for DoD personnel.
Top Secret (TS) Security Clearance.
Administers and manages the Wing Cybersecurity Office Program, including Communications Security, Computer Security, Tempest, Cybersecurity Awareness Program and Electronic System Security Assessment....
read moreAdministers and manages the Wing Cybersecurity Office Program, including Communications Security, Computer Security, Tempest, Cybersecurity Awareness Program and Electronic System Security Assessment....
read moreTop Secret (TS) Security Clearance. The incumbent performs the functions of teh Communications Security (COMSEC) Manager. Administers Communications Security/Secure Internet Protocol Router Network (C...
read moreTop Secret (TS) Security Clearance.
The incumbent performs as the Risk Management Framework (RMF) Specialist. Maintain current RMF Cybersecurity-related documentation and informationfor ht MAXGUN cyberspace Base Area Network (BAN). Supp...
read moreAdministers and manages the WCO Program, including Communications Security, Computer Security, Tempest, Cybersecurity Awareness Program and Electronic System Security Assessment. Top Secret (TS) Secur...
read moreAdministers and manages the WCO Program, including Communications Security, Computer Security, Tempest, Cybersecurity Awareness Program and Electronic System Security Assessment. Top Secret (TS) Secur...
read moreThe incumbent performs as the Risk Management Framework (RMF) Specialist. Maintain current RMF Cybersecurity-related documentation and informationfor ht MAXGUN cyberspace Base Area Network (BAN). Supp...
read moreCAP, CND, Cloud+, GSLC, Security+ CE: IT eLearning COMPTIA, FED-VTE, Skillsoft preferred for DoD personnel.
As a Target Security Specialist, no two days are ever the same, but a typical day will most likely include the following responsibilities:. The good news is that we have some amazing training that wil...
read moreThe good news is that we have some amazing training that will help teach you everything you need to know to be a Target Security Specialist. The role of a Target Security Specialist can provide you wi...
read moreThe role of a Target Security Specialist can provide you with the:. As a Target Security Specialist, no two days are ever the same, but a typical day will most likely include the following responsibil...
read moreThe role of a Target Security Specialist can provide you with the:. As a Target Security Specialist, no two days are ever the same, but a typical day will most likely include the following responsibil...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreAccess Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytic...
read moreAt Regions, the Corporate Security Case Development Specialist performs enhanced due diligence on reports of potentially suspicious activity, logs Corporate Security related incidents in a case manage...
read moreAt Regions, the Corporate Security Case Development Specialist performs enhanced due diligence on reports of potentially suspicious activity, logs Corporate Security related incidents in a case manage...
read moreAs the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident m...
read more