Featured Job
-
Job Removed or Not Found
Related Jobs
- Applied Research Solutions (Dayton, OH)
- …ARS is seeking a skilled ISSM to assist in the development and security hardening of a DevSecOps cloud environment to align with DoD RMF (NIST SP 800-53 r5) and CMMC 2.0
- Applied Research Solutions (Dayton, OH)
- …Applied Research Solutions has an immediate need for an Industrial Security Manager at the senior level in support of the Integrated Development Office (IDO) at
- BWX Technologies, Inc. (Jonesborough, TN)
- …Requires a Bachelor's degree in an appropriate discipline and five (5) years of directly related experience and knowledge of the following: + User agency security
- AeroVironment (Centreville, VA)
- …**Summary** The Information Systems Security Manager (ISSM) provides information systems security support for DoD and Non-DoD classified systems and networks. Standing up
- Swagelok (Solon, OH)
- …+ Work with the executive and business managers to align the Information Technology organization with business unit security and compliance needs. + Acts as a technical
- Pinkerton (Redwood City, CA)
- …+ Represent Pinkerton's core values of integrity, vigilance, and excellence. + Partner closely with the client's executives to understand requirements related to security
- Applied Research Associates, Inc. (Nashua, NH)
- …The Strategic Operations, Analysis, and Research (SOAR) Sector of Applied Research Associates (ARA), Inc. has an immediate need for a **Facility Security Manager** who
- RWE Clean Energy (Chicago, IL)
- …+ Develop and execute the physical security strategy in alignment with enterprise HSSE objectives and global standards. + Lead the integration of security governance into
- Applied Research Associates, Inc. (Albuquerque, NM)
- …The Southwest Division (SWD) of Applied Research Associates, Inc. (ARA) is seeking an experienced Information Systems Security Manager (ISSM) to join our Albuquerque, NM.
- Dickinson Financial Corporation (Kansas City, MO)
- …+ Perform risk assessments and impact analyses to identify vulnerable areas within the company's security program. The risk assessment process includes identifying