- Saliense Consulting (Mclean, VA)
- …a preview of the full benefits package. Position Title: Senior Cyber-Security Analyst / Navy Validator Location: Onsite in Arlington, VA Duties & Responsibilities: ... of ONR systems and networks. + Implements Navy Risk Management Framework ( RMF ) Implementation Plan IAW DODI 8510.01. + Develops, coordinates, and reviews detailed… more
- COLSA Corporation (Fort Eustis, VA)
- …Platform IT (PIT) systems during the acquisition process to include identifying cybersecurity requirements. . Review/complete RMF packages to include System ... Job Description: ISSO reviews and creates Risk Management Framework ( RMF ) Certification and Accreditation documentation, standard operating procedures, policies, and… more
- Jacobs (Tampa, FL)
- …system risks, risk mitigation courses of action, and operational. Additionally, the Cybersecurity Systems Analyst should be able to perform security evaluations ... assessments using the Security Content Automation Protocol tool. The Cybersecurity Systems Analyst will liaison with network...available in the USSOCOM-chosen automated tool. . mentation of cybersecurity requirements. . Provide DoD & IC RMF… more
- ICF (Adelphi, MD)
- …simply who we are and what we do. ICF is actively recruiting for a cleared Cybersecurity A&A Support Analyst to join our team based in our client's Adelphi, ... RMF ATO efforts. + Review and understand relevant policy and technical RMF Controls for specific...cybersecurity inspections such as: DAIG, CSA, and CCRI, RMF . + Develop and review Standard Operating Procedures (SOPs).… more
- Northrop Grumman (Boulder, CO)
- …history, they're making history. **Position Overview:** The selected Principal/Sr. Principal Cybersecurity Analyst will be responsible for perform assessments of ... higher grade based on qualifications listed below.** **Basic Qualifications for Principal Cybersecurity Analyst ** + Bachelor's Degree with 5 years of experience;… more
- Axient (El Segundo, CA)
- **Check out this NEW Opportunity with Axient!** Axient is seeking a ** Cybersecurity Analyst ** to support our customer in **El Segundo, CA.** The Cybersecurity ... detail-oriented organizational, interpersonal, and communications skills. APPLY HERE (https://careers-axient.icims.com/jobs/5573/ cybersecurity - analyst /job?mode=apply&apply=yes&in\_iframe=1&hashed=-336025105) Applicants for positions which require… more
- Cambridge International Systems Inc (Charleston, SC)
- …and complex obstacles! Cambridge International Systems, Inc. has a full-time Cybersecurity Analyst opportunity available based in Charleston, SC. Qualified ... active DoD Secret security clearance. + 3-5+ years of RMF experience. + 3-5+ years of technical analyst...is comprised of unique individuals, and it is our policy to provide equal opportunity in recruiting, hiring, training,… more
- Northrop Grumman (Linthicum, MD)
- …inspections and periodic audits. + Assist in the implementation of the required government RMF policy (ie ICD 503, JSIG, DAAPM), make recommendations on process ... Our employees are not only part of history, they're making history. ** Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from… more
- Northrop Grumman (Redondo Beach, CA)
- …emerging technology research inspections and periodic audits. + Implement the required government RMF policy (ie ICD 503, JSIG), make recommendations on process ... At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people,...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . This is achieved… more
- Integration Innovation, Inc. (i3) (Huntsville, AL)
- Overview i3 is seeking a Mid-Level Cybersecurity Analyst ! The Cybersecurity Analyst supports regular audits on computer systems and networks to determine ... security policies, procedures and standards with regards to Risk Management Framework ( RMF ). Responsibilities + Perform Army RMF assessments for Information… more
- Northrop Grumman (Beale AFB, CA)
- …emerging technology research inspections and periodic audits. + Implement the required government RMF policy (ie ICD 503, JSIG), make recommendations on process ... are not only part of history, they're making history. ** Cybersecurity Leaders, We Want You!** Cyber assets everywhere are...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . This is achieved… more
- Northrop Grumman (Sierra Vista, AZ)
- …Systems (NGDS) in Sierra Vista, AZ is seeking an experienced and qualified ** Cybersecurity Analyst ** to become an Information Systems Security Manager (ISSM). ... identify where those systems and networks deviate from acceptable configurations or policy . + Developing, maintaining, and overseeing the system security program and… more
- Federal Reserve System (Atlanta, GA)
- …senior consultant to business clients and department management on matters of cybersecurity third- party risk. Provides expert guidance to department management and ... team on security requirements and best practices. + Perform in-depth cybersecurity risk assessments; assessing the security stance of third-party entities, detecting… more
- RightDirection Technology Solutions LLC (Washington, DC)
- Sr. Cybersecurity Analyst - Cleared Fully Remote * Washington, DC (http://maps.google.com/maps?q=Washington+DC) Description RDTS is in need of a Sr. ... Cybersecurity Analyst to support the US Dept...and Authorization (A&A) processes under the Risk Management Framework ( RMF ) for new and existing information systems + Experience… more
- Jacobs (Hurlburt Field, FL)
- …authorization coordination. Advises and assists the customer with Risk Management Framework ( RMF ) and develops a Plan of Action and Milestones for resolving network ... devices, hardware, and software using the DoD & IC RMF to obtain an Authority to Operate (ATO), Interim...authorization, as well as the application and execution of policy , including project management support services. Advise USSOCOM, its… more
- Northrop Grumman (Linthicum, MD)
- …Chief Information Office (CIO)** is seeking a well-qualified **Sr. Principal Classified Cybersecurity Analyst ** to join our qualified, diverse, and dynamic team ... At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people,...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . Establishes strict program… more
- Northrop Grumman (Melbourne, FL)
- …Our employees are not only part of history, they're making history. ** Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from ... At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people,...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . This is achieved… more
- Northrop Grumman (Northridge, CA)
- …launch your career. At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people, processes and technology and ... those systems and networks deviate from acceptable configurations, enclave policy , or local policy . + Establishes strict...The ideal candidate will have a Bachelor's degree in Cybersecurity , a DoD 8570 IAM level III security certification… more
- Northrop Grumman (Rolling Meadows, IL)
- …Our employees are not only part of history, they're making history. ** Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from ... At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people,...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . + Establishes strict… more
- Northrop Grumman (Redondo Beach, CA)
- …Our employees are not only part of history, they're making history. ** Cybersecurity Professionals, We Want You!** Cyber assets everywhere are under siege from ... At Northrop Grumman, we take a holistic approach to cybersecurity , looking at the whole cyber landscape of people,...those systems and networks deviate from acceptable configurations, enclave policy , or local policy . Establishes strict program… more