- EchoStar (Littleton, CO)
- …and technologies + Knowledge of network protocols, operating systems, and security frameworks + Experience with vulnerability assessment and penetration ... security + Relevant certifications such as CompTIA Security +, Certified Ethical Hacker (CEH), or Certified Information...accessibility of our website or need assistance completing the application process. This contact information is for… more
- Serco (Virginia Beach, VA)
- …supporting the United States Navy - Serco has a great opportunity for you! This Information Security Test Engineer will be on a dynamic team responsible for ... collaborative skills to make an impact towards our national security homeland defense. **This position is contingent upon your...(with photo) with name and address that match the information entered on the application . Serco will… more
- MUFG (Tampa, FL)
- …across the application lifecycle. This role bridges the gap between information security risk governance and security architecture. **Responsibilities:** ... years' experience in a combination of risk management, Cloud information security , secure coding, application ... security configuration with a focus on executing information security risk assessment /testing methodologies,… more
- Veterans Affairs, Veterans Health Administration (North Chicago, IL)
- …to the application and questionnaire, this position requires an online assessment . The online assessment measures critical general competencies required to ... Summary This position serves as the Security Assistant for Police Service at the Captain...completes records and other logs; enters, updates and retrieves information from a variety of computer systems/databases; uses state… more
- HCA Healthcare (Nashville, TN)
- …background in IT Security and Operational processes + Proven understanding of information security risk assessment and risk management procedures + ... Security Architect is responsible for the coordination of Information Security Architecture and Engineering activities for...Network Security , Data Security , Mobile Security , Application Security , Identity … more
- Leidos (Arlington, VA)
- …operating systems, networks, applications, and cloud environments. + Knowledge of security best practices, risk assessment , and vulnerability classification (eg, ... **Description** Leidos has an immediate need for a Security Engineer for a customer on a highly...name. Leidos will never ask you to provide payment-related information during any part of the employment application… more
- Alaka'ina Foundation Family of Companies (Kauai County, HI)
- …supporting Assessment and Authorization (A&A) processes, and ensuring the security posture of information systems. DESCRIPTION OF RESPONSIBILITIES: + Execute ... located in Kekaha, Hawai'i. Seeking a skilled and detail-oriented Information System Security Officer (ISSO) to support...the DoDI 8510.01 Risk Management Framework (RMF) for DoD Information Systems and assist in implementing DoD Assessment… more
- ICF (San Jose, CA)
- …assessors, and documentation specialists. + Develop and maintain key RMF artifacts including Security Assessment Plans (SAPs), System Security Plans (SSPs), ... accuracy and completeness. + Interface with Authorizing Officials (AOs), Information System Security Managers (ISSMs), and ...familiarity with eMASS, ACAS, STIG Viewer, and other DoD assessment tools. + Demonstrated ability to lead security… more
- Truist (Raleigh, NC)
- …post-implementation support level. Principally works, under limited supervision, with Corporate Information Security (CIS) personnel, Line of Business (LOB) ... in Identity and Access Management and significant breadth of experience across cyber / information security . + May be called upon to contributed to scope and… more
- HCA Healthcare (Nashville, TN)
- …background in IT Security and Operational processes + Proven understanding of information security risk assessment and risk management procedures + ... Security Architect is responsible for the coordination of Information Security Architecture and Engineering activities for...Network Security , Data Security , Mobile Security , Application Security , Identity … more