Coordinate and execute proactive Information Security consulting to the business and technology teams covering API Security, File Transfer, Infrastructure Security, Resiliency, Data Security, Network ...
read moreAdvises the Authorizing Official (AO), an information system owner, or the Chief Information Security Officer (CISO) on the security of an information system or program. Advanced Information Systems S...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering API Security, File Transfer, Infrastructure Security, Resiliency, Data Security, Network ...
read moreManages security controls to ensure confidentiality, integrity, and availability of information and information systems; builds security into the development process and defines security specification...
read moreManages security controls to ensure confidentiality, integrity, and availability of information and information systems; builds security into the development process and defines security specification...
read moreReporting security incidents not involving IT resources to the appropriate security office; and representing the security team as part of change management for assigned information systems. Department...
read moreReporting security incidents not involving IT resources to the appropriate security office; and representing the security team as part of change management for assigned information systems. Subject Ma...
read moreOverviewThe Information Systems Security Manager (ISSM) is responsible for implementing and overseeing cyber hygiene for all refugee operational activities within the Refugee Processing Center (RPC). ...
read moreOverviewThe Information Systems Security Manager (ISSM) is responsible for implementing and overseeing cyber hygiene for all refugee operational activities within the Refugee Processing Center (RPC). ...
read moreGIAC Information Security Professional (GISP), ISC2 Certified Information Systems Security Professional (CISSP) or equivalent. Cyber Security Analyst/Information Security Manager. Bachelor's Degree fr...
read moreGIAC Information Security Professional (GISP), ISC2 Certified Information Systems Security Professional (CISSP) or equivalent. Cyber Security Analyst/Information Security Manager. Bachelor's Degree fr...
read moreDevelops security procedures and methods to ensure the safety of information systems and to protect the system from intentional (unauthorized) or accidental (inadvertent) access or destruction. Engine...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreYour responsibilities include managing security aspects of the Information System, performing day-to-day security operations, evaluating security solutions, conducting vulnerability/risk assessments, ...
read moreDevelops security procedures and methods to ensure the safety of information systems and to protect the system from intentional (unauthorized) or accidental (inadvertent) access or destruction. Engine...
read moreOverview Steampunk is seeking a Subject Matter Expert (SME) Information System Security Manager to support our Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Age...
read moreYour responsibilities include managing security aspects of the Information System, performing day-to-day security operations, evaluating security solutions, conducting vulnerability/risk assessments, ...
read moreOverview Steampunk is seeking a Subject Matter Expert (SME) Information System Security Manager to support our Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Age...
read moreOverview Steampunk is seeking a Subject Matter Expert (SME) Information System Security Manager to support our Department of Homeland Security (DHS), Cybersecurity and Infrastructure Security Ag...
read moreInformation Systems Security Manager (ISSM). Information Systems Security Manager (ISSM). Serve as the primary point of contact for security and contract issues, ensuring systems meet security and con...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreManage Information System Security Officers (ISSO) to support information technology (IT) security goals and objectives and reduce overall organizational risk. Business Technology Integrators (BTI) is...
read moreInformation Systems Security Manager. Support efforts to ensure all users have the necessary security clearances, authorization, need-to-know, and awareness of security responsibilities before grantin...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreIn this role, the candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effect...
read moreInformation Systems Security Manager. Information System Security Manager. Support efforts to ensure all users have the necessary security clearances, authorization, need-to-know, and awareness of sec...
read moreIn this role, the candidate will work closely with Information System Security Engineers (ISSEs) and Information System Security Officers (ISSOs) to evaluate security solutions and assess their effect...
read moreGray Tier Technologies has an exciting opportunity as an Information Systems Security Manager (. Address physical security matters to information assessments, security tests and evaluations, preparati...
read moreGray Tier Technologies has an exciting opportunity as an Information Systems Security Manager (. Address physical security matters to information assessments, security tests and evaluations, preparati...
read moreThe Information Systems Security Manager (ISSM) is responsible for implementing and overseeing cyber hygiene for all refugee operational activities within the Refugee Processing Center (RPC). Knowledg...
read moreManage security aspects of the Information System and perform day-to-day security operations. Information Systems Security Manager with a TS/SCI w/ Poly. Assist ISSEs and ISSOs in evaluating security ...
read moreManage security aspects of the Information System and perform day-to-day security operations. Information Systems Security Manager with a TS/SCI w/ Poly. Assist ISSEs and ISSOs in evaluating security ...
read moreInformation System Security Manager to join our growing team in support of a federal customers enterprise security initiatives and strategy. The ideal candidate will support the efforts required to en...
read moreInformation System Security Manager to join our growing team in support of a federal customers enterprise security initiatives and strategy. The ideal candidate will support the efforts required to en...
read moreGeneral Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Secur...
read moreGeneral Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Mathematics, Computer Forensics, Cybersecurity, Information Technology, Information Assurance, Information Secur...
read moreIn support of our core customers, we provide Cybersecurity Engineering and Operations; Core Enterprise Systems O&M Support; Networking; Engineering; Security System and Network Administration Services...
read moreIn support of our core customers, we provide Cybersecurity Engineering and Operations; Core Enterprise Systems O&M Support; Networking; Engineering; Security System and Network Administration Services...
read moreThe Information Systems Security Manager, Process Research IV ensures the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and pro...
read moreThey monitor security controls for Information Systems to maintain security Authorized to Operate (ATO) and develop Plan of Action and Milestones (POAMs) in response to identified security vulnerabili...
read more