- ManTech (Stafford, VA)
- …and standards like ISO 27001 is highly beneficial IT and cybersecurity budgeting, risk management , and compliance. + Proficiency in ERP systems, financial ... functional leader and is responsible for the oversight of a Financial Management Team + Requires expertise in contractor finance, accounting, Defense Federal… more
- General Dynamics Information Technology (Norfolk, VA)
- …**Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Case Management ,Cybersecurity,Incident Analysis,Security ... information for mitigation coordination. + Utilize cyber and case management tools. + Prepare case evidence and incident reports....to start date. + DoD Approved Baseline 8570 CSSP Auditor (CEH, CySA, CISA, etc.) certification is required prior… more
- TestPros (Sterling, VA)
- …SOC 2 + Cloud computing security + Security governance and policy + Security risk analysis + Threat Intelligence + Incident Management - analysis, detection, and ... State, and Local Government customers. Our capabilities include Program Management , Program Oversight, Process Audit, Intelligence Analysis, Cyber Security, NIST… more
- CACI International (Fort Belvoir, VA)
- …clearance is required. **Responsibilities:** + Develop quality input for program management documents to include acquisition plans and strategies, source selection ... system concepts and specifications. + Review and evaluate system performance, assess risk , and make recommendations with respect to product acceptability. + Assure… more
- The Metamorphosis Group (Mclean, VA)
- …and shepherding IT applications and systems through the Intelligence Community Directive 503 Risk Management Framework (ICD 503 RMF) following the Sponsor's A&A ... security teams as well as the engineering team; however the Sponsor's staff management will manage the priorities. The Contractor shall create and review systems… more
- CareFirst (Reston, VA)
- …organizational strategic plan objectives and security requirements. Advises management in developing cybersecurity policies, processes, and procedures. **ESSENTIAL ... Ethical Hacker (CEH) Upon Hire Preferred + Certified Information Systems Auditor (CISA) Upon Hire Preferred. **Preferred Qualifications** + The candidate must… more