- Trace Systems Inc (Portsmouth, VA)
- …management, and vulnerability remediation efforts. + Coordinate with ISSMs, Information System Security Officers (ISSOs), and system owners to validate ... requirements as defined by Public Laws, National, DoD, and DON [e.g., Federal Information Security Management Act (FISMA), DoDD 8100.02, DODI 8500.01, DoDI 8520,… more
- BMO Financial Group (Milwaukee, WI)
- …tools. Conducts system tests in order to ensure optimum data security , availability, and performance. Applies proficiency in programming languages, deployment tools, ... + Identifyies and deploys cybersecurity measures by continuously performing vulnerability and other risk management assessments. + Creates and implements… more
- Oracle (Jackson, MS)
- …and performance management. + Collaborate with partner teams (Networking, Compute, Security , SRE) to land dependencies, resolve conflicts, and align on SLAs/SLOs. ... Maintain secure development practices: signed artifacts, change control, auditability, vulnerability management, and compliance with Oracle policies. Scope and… more
- ERP International (Washington, DC)
- …experience with developing custom mitigation techniques. + Working knowledge of information systems security standards/practices (eg, access control and system ... in the government and commercial sectors. We provide comprehensive enterprise information technology, strategic sourcing, and management solutions to DoD and federal… more
- Cisco (San Jose, CA)
- …with infrastructure as code concepts and declarative configuration management. + Security mindset: access controls, workload isolation, and vulnerability ... Collaborating closely with cross-functional teams, including development, product management, and security . + Significantly invest in AI based Engineering and Test… more
- Leidos (Piketon, OH)
- …of cybersecurity risks. This role combines project management, vulnerability management, compliance oversight, and technical documentation responsibilities to ... support enterprise security objectives and regulatory requirements. **Key Responsibilities** **Cybersecurity Project Management** + Act as Project Manager for… more
- M. C. Dean (District Of Columbia, DC)
- …management documentation and incident logs. **Cybersecurity Operations** + Serve as the ** Information System Security Manager (ISSM)** for all assigned ... RMF assessment and authorization process. . Implement Implementation of DoD Security Technical Implementation Guides (STIGs) on traditional Information … more
- Toyota (San Juan, PR)
- …requirements. + Ensure that all processes and technologies are compliant with TFS Information Security standards (GISG, TMCC, etc.). + Complete monthly report of ... exceptions for approval. + Provide status and metrics of information security activities and review with ...all team members and new hires complete the required security awareness training. + Report to IT Manager… more
- Air National Guard Units (Des Moines, IA)
- …technical recommendations for changes to the security posture to the Wing Information System Security Manager (ISSM). Prepares and presents applicable ... Serves as a technical expert and focal point for Information Technology (IT) security and information...physical access to systems and equipment. Conducts risk and vulnerability assessments of DoD classified information systems… more
- BOOZ, ALLEN & HAMILTON, INC. (Alexandria, VA)
- …3+ years of experience using data orchestration tools, such as Splunk, to develop vulnerability management and security risk dashboards + Knowledge of ACAS, such ... or AWS Security Additional Qualifications: + Experience with Splunk Enterprise Security , STIG Manager , or similar orchestration or automation tools +… more