• Eisai, Inc (Nutley, NJ)
    … posture. Qualifications and Experience: - Bachelor's degree in Computer Science, Information Security , or a related field (Master's degree preferred).- Relevant ... user access management solutions at the network, application and information layers as well as oversight of Privileged Account...This role will be required to provide input into vulnerability management, risk management, security architect, … more
    HireLifeScience (04/26/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    …and critical information systemsKnowledge and experience performing network security vulnerability assessments.Knowledge and experience with all areas of ... planning, analysis , development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures and tools.… more
    JobGet (05/14/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    …and critical information systemsKnowledge and experience performing network security vulnerability assessments.Knowledge and experience with all areas of ... planning, analysis , development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures and tools.… more
    JobGet (05/03/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    analysis , development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures and tools.ESSENTIAL ... Officer (ISSO) in the Office of the Chief Information Security Officer (CISO) of a large...DUTIES & RESPONSIBILITIESPlan, develop, and conduct security testing including vulnerability and compliance scans.… more
    JobGet (05/14/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    …and critical information systemsKnowledge and experience performing network security vulnerability assessments.Knowledge and experience with all areas of ... planning, analysis , development, implementation, maintenance, and enhancement of information systems security programs, policies, procedures and tools.… more
    JobGet (05/16/24)
    - Save Job - Related Jobs - Block Source
  • Globe Life Inc. (Mckinney, TX)
    Information Security Analyst II Primary Duties & Responsibilities JOB SUMMARY Experience what being part of the Globe Life family feels like. Be inspired by your ... paid time off, tuition reimbursement and other career development opportunities. The Information Security Analyst is responsible for establishing and executing a… more
    JobGet (04/30/24)
    - Save Job - Related Jobs - Block Source
  • Dunhill Professional Search (Fairfax, VA)
    …various applications, programming languages and platforms.Supports development of technical security safeguards to protect information systems from intentional ... formulate security requirementsDefines, maintains, and enforces application security best practices.Conduct vulnerability assessment and manual/automated… more
    JobGet (05/20/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Boyers, PA)
    …malware detection, log file analysis , and enterprise-wide incident response and security information and event management (SIEM) tools. The engineer will be ... have appropriate security controls in place in accordance with the Federal Information Security Management Act (FISMA). To accomplish this goal, the … more
    JobGet (05/14/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    …malware detection, log file analysis , and enterprise-wide incident response and security information and event management (SIEM) tools. The analyst will be ... controls in place in accordance with the Federal Information Security Management Act (FISMA). To accomplish...responsible for continuous surveillance, analysis , mitigation, remediation and incident management using the client's… more
    JobGet (05/17/24)
    - Save Job - Related Jobs - Block Source
  • DCS Corp (Ridgecrest, CA)
    …work independently and within a dynamic environment and adhere to strict information system security guidelines. Strong verbal and written communication skills, ... conduct of Cyber Survivability Risk Assessments (CSRAs) and threat vector analysis . Essential Job Functions: Assess/determine cyber threats at the system,… more
    JobGet (05/04/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Washington, DC)
    …malware detection, log file analysis , and enterprise-wide incident response and security information and event management (SIEM) tools. The analyst will be ... controls in place in accordance with the Federal Information Security Management Act (FISMA). To accomplish...responsible for continuous surveillance, analysis , mitigation, remediation and incident management using the client's… more
    JobGet (05/01/24)
    - Save Job - Related Jobs - Block Source
  • Bering Straits Native Corporation (Beavercreek, OH)
    …MSSP, RAR, SCTM).Research, configure, analyze and/or use software applications for security vulnerability monitoring, security automation and ... Maintain day-to-day security posture and continuous monitoring of application including security event log review and analysis .Ensure system security more
    JobGet (05/03/24)
    - Save Job - Related Jobs - Block Source
  • Credit Acceptance Corporation (Atlanta, GA)
    …field of study or equivalent experience Minimum 6 years of experience in the Information Security field Minimum 4 years of experience deploying services on ... customizing security tools to address threats and lower risk: vulnerability scanners, static analyzers, web application firewalls, IDS/IPS, malware analysis ,… more
    JobGet (05/19/24)
    - Save Job - Related Jobs - Block Source
  • DCS Corp (Bedford, MA)
    Security Risk Analyses, OPSEC Plans, Computer Certification and Accreditation, Security Vulnerability and Countermeasures Analyses, Security Concepts of ... and implement security -related surveys, assessments, and studies. Evaluate program security information and hardware throughout the program life cycle, to… more
    JobGet (05/18/24)
    - Save Job - Related Jobs - Block Source
  • ConsultNet (Rockville, MD)
    …candidate will have a strong understanding of how to apply the principles of Information Security in a variety of circumstances and expertise translating the ... Action and Milestones (POA&M) Assist in the review and analysis of Security Authorization Packages for completeness...and closure of audit field work Provide review and analysis of vulnerability scan results from tools… more
    JobGet (05/11/24)
    - Save Job - Related Jobs - Block Source
  • Northeast Georgia Health System, Inc (Gainesville, GA)
    …to anticipate and quickly respond to emerging threats. Builds and Manages Information Security Infrastructure to include Anti-Malware, Data Loss Prevention, ... Job Category: Information Technology Work Shift/Schedule:VariesNortheast Georgia Health System is...new tools, technologies, and intelligence sources as appropriate. Analyzes security systems log files, reconciles correlated security more
    JobGet (05/05/24)
    - Save Job - Related Jobs - Block Source
  • Reynolds Consumer Products Inc. (Lake Forest, IL)
    …mitigate cybersecurity risks.Support incident response activities, including investigating security incidents, performing forensic analysis , and implementing ... as firewalls, intrusion detection/prevention systems, antivirus, and SIEM.Experience with vulnerability assessment tools and techniques.Experience with security more
    JobGet (05/18/24)
    - Save Job - Related Jobs - Block Source
  • DCS Corp (Niceville, FL)
    …Hypervisors, Enterprise networking/firewalls/intrusion detection/prevention systems, forensic analysis / vulnerability assessment, Group Policy management ... Clearance with SCI Eligibility, Eligibility for access to Special Access Program Information and a willingness to submit to a counterintelligence polygraph. DoD 8570… more
    JobGet (05/23/24)
    - Save Job - Related Jobs - Block Source
  • U of C NORC (Chicago, IL)
    …database, and application operations Previous experience in the advanced use of information security assessment techniques (eg, vulnerability scanning, ... certification such as Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified in Risk and Information more
    JobGet (05/22/24)
    - Save Job - Related Jobs - Block Source
  • EDI Staffing (Gaithersburg, MD)
    … triage, reporting and remediation tracking in support to client's Information Security Operations teamUS Citizenship required Basic experience in ... network and application penetration testingExperience in penetration testing management, Vulnerability triage, analysis and remediation tracking. Project… more
    JobGet (05/16/24)
    - Save Job - Related Jobs - Block Source