- Noblis (Philadelphia, PA)
- …acquisition, engineering, systems integration, in-service and fleet engineering with cybersecurity , comprehensive logistics, and life-cycle savings. We are looking ... to hire a Configuration Manager with strong MS Office skills to provide support...work environment. **Prinicpal Duties/Responsibilities** + Prepare, maintain and manage Program Requirements + Write, review, and maintain plans related… more
- EMCOR Group (Washington, DC)
- …EMCOR Government Services (EGS) is currently seeking a **Deputy Project Manager (DPM)** to manage contract operations supporting the Department of Transportation ... Washington, DC At the direction of the Sr. Project Manager , the DPM leads a team of dedicated and...senior management and client on project management capability and risk . + Ensures that all employees follow the Government… more
- Bristol Myers Squibb (Princeton, NJ)
- …monitoring, and continuous improvement. + Ensure hands-on leadership in data privacy, cybersecurity frameworks, GxP validation, and risk management for regulated ... lives. Read more: careers.bms.com/working-with-us . **Position Summary:** The Senior Manager , Technical Lead / Solution Architect combines strategic solution design… more
- General Dynamics Information Technology (Chantilly, VA)
- …+ Polygraph **Public Trust/Other Required:** None **Job Family:** Program Delivery and Execution **Skills:** Business Operations,Deliverables Management,Technical ... mission outcomes for our customers as a Technical Project Manager . Here, you'll see the bigger picture on mission...the bigger picture on mission initiatives and where your program management career can go at GDIT. **MEANINGFUL WORK… more
- V2X (Springfield, VA)
- … Assessment Report or Security Compliance Report which focuses on the assessment of a Cybersecurity program at a location. Shall provide a draft report using the ... the documentation submitted to support the various steps of Risk Management Framework (RMF). Recommend a format for this...Program Implementation Guide (JSIG) to information systems or Cybersecurity programs. . A cyber credential at the Master… more
- Lockheed Martin (King Of Prussia, PA)
- …Officer \(FSO\) and Program Management\. * Overseeing and conducting risk assessments on cybersecurity architecture and perform comprehensive investigations ... **Description:** Responsibilities of the Information System Security Manager \(ISSM\) include: * Overseeing and directing day\-to\-day...Information Security / Information Systems Security Program together with the Facility Security… more
- OneMain Financial (Baltimore, MD)
- …other sensitive HR data through scoped apps, ACLs, encryption, and retention enforcement ** Cybersecurity , Risk , and Compliance Enablement** . Equip Cyber and GRC ... OneMain Financial is seeking a strategically minded, technically fluent Software Engineering Manager to lead and evolve our ServiceNow practice. This is a… more
- NBC Universal (Orlando, FL)
- …storage, application development, and cybersecurity . + Experience in project or program management. + Risk management experience to identify and assess and ... as it relates to technology standards, process governance, and risk identification & mitigation plans. The Senior Manager... risk identification & mitigation plans. The Senior Manager , Architecture Standards & Governance will be a leader… more
- AIG (Atlanta, GA)
- At AIG, we are reimagining the way we help customers to manage risk . Join us as a Senior Technology Manager to play your part in that transformation. It's an ... you will create an impact We are seeking an experienced Senior Technology Manager to lead our technology initiatives, oversee technical teams, and drive innovation… more
- Spark Power (TX)
- …a comprehensive NERC Compliance Program . What you will do as a Project Manager - NERC Compliance: + Lead and manage the NERC CIP implementation program , ... energy in North America, is looking for a Project Manager -NERC Compliance to join our Spark team. The...ensure compliance with NERC CIP, SOX, NIST, and other cybersecurity standards + Conduct regular risk assessments… more