- CIBC (Chicago, IL)
- …Thinking, Decision Making, Information Security , Internal Auditing, Security Risk , Technical Training, Troubleshooting, Vendor Management At CIBC, we are ... and continuous improvement. AI and Automation: + Support the management of the US Information Security AI...clear and impactful manner. + Perform controls as assigned control performer + Implement continuous improvement areas + Create… more
- KBR (Chantilly, VA)
- …consistent engagement and touch points across crucial account stakeholders. Compliance and Risk Management : Ensure all account activities comply with company ... security programs, services, and solutions. Key Responsibilities: Account Management : Oversee and manage critical CJADC2 accounts ensuring client satisfaction,… more
- Pacific Northwest National Laboratory (Richland, WA)
- …Physical Access Control Systems (PACS), Intrusion Detection Systems (IDS), Video Management Systems (VMS), and other physical security technologies to ensure ... employee health, preventing workplace incidents, and safeguarding physical and information security . Core functions include risk assessment, safety training,… more
- Noblis (Philadelphia, PA)
- …develop authorization boundary diagrams and architecture diagrams + Maintain awareness of evolving security and risk management standards + Participate in ... lifecycle + Conduct certification and testing in accordance with Risk Management Framework (RMF) + Support the...(ACAS) and may be required to hold an Interim Security Control Assessor qualification. + Active DoD… more
- ARSIEM (Columbia, MD)
- …required Preferred Qualifications + Experience with risk assessments, security architect solutions, data visualizations, project management , and strong ... GOTS cryptography + Identification, authentication, and authorization + System integration + Risk management + Intrusion detection + Contingency planning +… more
- The Gleason Works (Rochester, NY)
- …on security monitoring and incident response best practices Vulnerability & Risk Management + Perform regular vulnerability assessments and coordinate patch ... user provisioning, conditional access policies, group policies, privileged identity management (PIM), role-based access control (RBAC), and...this means for the role: You will map existing security controls to NIST control families (Access… more
- TekSynap (Huntsville, AL)
- …and coordinate activities within the Prepare step, ensuring roles, responsibilities, and risk management strategies are clearly defined and maintained. + Guide ... focus on quality and completeness of all deliverables. + Ensure comprehensive security control assessments are planned, executed, and documented to validate… more
- General Dynamics Information Technology (Mclean, VA)
- …provider of cyber security services to the customer. We provide consummate cyber security risk management "as a service" platform across multiple fabrics ... + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Cybersecurity Risk Management… more
- TECO Energy (Ybor City, FL)
- …of fundamental principles of cybersecurity, including threat landscape, vulnerabilities, and risk management . + Significant high-level system/ security ... Security role, systems management , systems administration, information systems security , system certification, risk analysis) with a focus on DLP and/or… more
- Northrop Grumman (San Diego, CA)
- …Mission Systems is a trusted provider of mission-enabling solutions for global security . We have a wide portfolio of secure, affordable, integrated, and multi-domain ... systems and technologies. Our differentiated battle management and cyber (https://www.northropgrumman.com/what-we-do/mission-solutions/cyber) solutions deliver timely, mission-enabling information… more