Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreAbility to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust soft...
read moreAbility to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust soft...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreThe individual will be responsible for leading a small team of project managers within the Information Security Department while also being 'hands on keyboard' to drive large transformational efforts ...
read moreAs the Information Systems Security Manager (ISSM), you will own the systems that enable Palantirians to productively use our USG facilities and related enclaves in support of our critical DoD mission...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreTitle: Information System Security Manager (ISSM). McIntire Solutions is seeking an Information System Security Manager (ISSM) to support our McLean Customer. Support customer RMF workflow and process...
read moreA0161: Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robu...
read moreSenior Manager - Information Security - Identity and Access Management. Manager will be responsible for developing and sustaining services related to WAM, MFA, and directory services, application onbo...
read moreThis position is part of the HFS cyber security team and is responsible for maintaining and improving the security posture for the information systems that support the development and fielding of a va...
read moreA0161: Ability to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robu...
read moreTitle: Information System Security Manager (ISSM). McIntire Solutions is seeking an Information System Security Manager (ISSM) to support our McLean Customer. Support customer RMF workflow and process...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreThe individual will be responsible for leading a small team of project managers within the Information Security Department while also being 'hands on keyboard' to drive large transformational efforts ...
read moreAbility to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust soft...
read moreAbility to integrate information security requirements into the acquisition process; using applicable baseline security controls as one of the sources for security requirements; ensuring a robust soft...
read moreSenior Manager - Information Security - Identity and Access Management. Manager will be responsible for developing and sustaining services related to WAM, MFA, and directory services, application onbo...
read moreEnsure that information system security requirements are addressed during all phases of an information system security lifecycle. Certified Information Security Manager (CISM) (optional but highly rec...
read moreDevelop, implement, and maintain a comprehensive information security program that includes policies, procedures, and guidelines to protect the organizations information assets. Manage the organizatio...
read moreDevelop, implement, and maintain a comprehensive information security program that includes policies, procedures, and guidelines to protect the organizations information assets. Regularly review and u...
read moreEnsure that information system security requirements are addressed during all phases of an information system security lifecycle. The ISSM's primary function will be to provide oversight for a team of...
read moreDevelop, implement, and maintain a comprehensive information security program that includes policies, procedures, and guidelines to protect the organization’s information assets. Regularly review and ...
read moreCANDIDATE PROFILE Education and Experience Required: Bachelor's degree in Information Systems or related field or equivalent experience/certification 7+ years of information technology leadership expe...
read moreCANDIDATE PROFILE Education and Experience Required: Bachelor's degree in Information Systems or related field or equivalent experience/certification 7+ years of information technology leadership expe...
read moreEnsure that information system security requirements are addressed during all phases of an information system security lifecycle. Participate in an information security risk assessment during the Secu...
read moreDevelop, implement, and maintain a comprehensive information security program that includes policies, procedures, and guidelines to protect the organization’s information assets. Regularly review and ...
read moreThe Information Security Risk and Compliance Manager’s role primarily includes the oversight, coordination, and management of the College’s compliance with the Information Technology (IT) organization...
read moreThe Information Security Risk and Compliance Manager’s role primarily includes the oversight, coordination, and management of the College’s compliance with the Information Technology (IT) organization...
read moreRequired: Years of Experience: at least 5 years of documented experience and/or education in IT or Cybersecurity Bachelor of Science degree in Information Systems, cybersecurity, Network Systems Techn...
read moreEngage with the security control assessor (SCA) from the authorizing official (AO) office, to negotiate the balance of mission needs and cybersecurity. Certified Information Systems Security Professio...
read moreManage Information System Security Officers (ISSO) to support information technology (IT) security goals and objectives and reduce overall organizational risk. Chief Information Security Officer [CISO...
read moreThe individual will be responsible for leading a small team of project managers within the Information Security Department while also being 'hands on keyboard' to drive large transformational efforts ...
read moreManage Information System Security Officers (ISSO) to support information technology (IT) security goals and objectives and reduce overall organizational risk. Identify alternative information securit...
read moreAdvanced skills in applying information gathering, fact-finding and dissemination techniques to ensure the necessary and appropriate information is available in a timely manner. DHS Single Point of Se...
read moreMaintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the mana...
read moreMaintain operational security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed. Assist with the mana...
read moreIn this role, the Information Security Manager will support building cybersecurity resilience in our network and information infrastructure, navigating evolving regulatory and IT environments to ensur...
read more