- TestPros (Norfolk, VA)
- …Support the collection and use of data for our critical Information Assurance Vulnerability Management (IAVM) Program using various security tools (ie ACAS, ... State, and Local Government customers. Our capabilities include Program Management , Program Oversight, Process Audit, Intelligence Analysis, Cyber Security, NIST… more
- City National Bank (Los Angeles, CA)
- …MANAGER , INFORMATION SECURITY II ** **WHAT IS THE OPPORTUNITY?** Information Security Manager II (Administrative Services Management ) is a SME and ... identity management , security engineering and architecture, security operations, threat and vulnerability management or cyber risk management + Ability… more
- General Dynamics Information Technology (Hanscom AFB, MA)
- …related experience **US Citizenship Required:** Yes **Job Description:** Information Systems Security Manager (ISSM) II The ISSM's primary function serves as a ... None **Job Family:** Information Security **Skills:** Information Security,Information Security Management ,Information System Security **Certifications:** Cisco Certified Network Associate (CCNA)… more
- City of Portland (Portland, OR)
- Policy and Planning Manager ( Manager II ) Print (https://www.governmentjobs.com/careers/portlandor/jobs/newprint/4533966) Apply Policy and Planning ... Manager ( Manager II ) Salary $138,174.40 - $189,113.60 Annually...zoning regulations, contracts and intergovernmental agreements, budget development and management , and other major work functions. This position leads… more
- Google (San Jose, CA)
- …security directly into every phase of the software development process), vulnerability management , security engineering, and compliance engineering. Automotive ... street or across the globe. As a Technical Program Manager at Google, you'll use your technical expertise to...Manage operational aspects of Android Auto SDL programs, including vulnerability management and reporting. + Establish a… more
- Global Resource Solutions (Hanscom AFB, MA)
- …detail orientated, and talented individual for the position of Information System Security Manager II . Job Description: Summary: The ISSM II 's primary ... corrective measures have been taken when an incident or vulnerability has been discovered within a system + Ensure...the security posture of the AIS + Ensure configuration management (CM) for security-relevant AIS software, hardware, and firmware… more
- Criterion Systems (Washington, DC)
- …Veterans to apply. Responsibilities We are seeking aInformation Systems Specialist II (Mid)to support our Department of Transportation (DoT) customer inWashington, ... DC! Selected incumbent will support in the area of information system cybersecurity management ensuring security posture and compliance tasks, to include but not be… more
- Amazon (Seattle, WA)
- …Verification and Validation Team is looking for a Security Technical Program Manager to own the strategy and continuous improvement of implementing quality control ... features, systems, and networks. This includes performing penetration testing and vulnerability assessments, running a Bug Bounty program and campaigns, providing… more
- Amazon (Seattle, WA)
- …great opportunities for our customers and for you! We are looking for a Risk Manager to join our RISC Customer Safety Insights and Investigations team. As a Risk ... Manager you will be responsible for: . Identifying, containing,...determining scope, urgency, and potential impact, identifying the specific vulnerability , and making recommendations that enable expeditious remediation. .… more
- BrightSpring Health Services (Louisville, KY)
- …Overview BrightSpring Health Services is seeking an experienced Information Security Engineer II to join our growing Security Team. The Information Security Engineer ... to keep it secure and effective. The Security Engineer II is a security subject matter expert in one...on findings, status, and recommendations to the Security Engineering Manager + Works with IT resources and business leaders… more
- North Carolina Agriculture & Technical State Unive (Greensboro, NC)
- …Privilege Manager , and Veeam backup systems. 5. Experience with vulnerability management , incident response, basic server forensics, and evidence handling. ... servers operate in an efficient and secure manner. This position participates in vulnerability management and incident response and provides high performance and… more
- General Dynamics Information Technology (Salt Lake City, UT)
- … Management ,Information Security Standards,Security Information,Security Information Management **Certifications:** CISM: Certified Information Security ... **US Citizenship Required:** Yes **Job Description:** Information Systems Security Officer (ISSO) II The ISSO's primary function serves as a principal advisor on all… more
- Premera Blue Cross (Mountlake Terrace, WA)
- …Healthsource blog: https://healthsource.premera.com . The **Cybersecurity Threat Intelligence Engineer II (Intelligence)** is a member of the **Threat Intelligence ... and Response Team** , reporting to the Manager of Threat Intelligence and Response. This position is responsible for responding to cyber security incidents, using… more
- Applied Research Solutions (Bedford, MA)
- …artifacts mandated by governing DoD and Air Force policies (ie, Risk Management Framework (RMF). + Recommending policies and procedures to ensure the reliability ... access to systems, networks, and data. + Conducting risk and vulnerability assessments of planned and installed information systems to identify vulnerabilities,… more
- MIT Lincoln Laboratory (Lexington, MA)
- Position Description The Cyber Security Vulnerability Management Team Lead will provide leadership and direction in the day-to-day management of the ... assessment, tracking, and remediation efforts to the Laboratory Cyber Security Vulnerability Management Infrastructure. The Cyber Security VM Team Lead will… more
- BAE Systems (Fort Wayne, IN)
- …Responsible for supporting adherence to all aspects of a rigorous Risk Management Framework (RMF) compliance program as stipulated by NISPOM/DAAPM, JSIG, ICD 503, ... Operate (ATO) approvals for various systems by adhering to the Risk Management Framework (RMF). This position supports cybersecurity efforts throughout the RMF… more
- BAE Systems (Manchester, NH)
- …Responsible for supporting adherence to all aspects of a rigorous Risk Management Framework (RMF) compliance program as stipulated by NISPOM/DAAPM, JSIG, ICD 503, ... Operate (ATO) approvals for various systems by adhering to the Risk Management Framework (RMF). This position supports cybersecurity efforts throughout the RMF… more
- Trace Systems Inc (Sierra Vista, AZ)
- …Implementation Guides (STIG) / Security Requirements Guide (SRG), Information Assurance (IA) Vulnerability Management (IAVM), test to validate, and update within ... in the monthly DoD PPSM representatives meeting. + Support Information Assurance Vulnerability Management (IAVM) and Internet Protocol Network Scanning (IPNS) /… more
- MIT Lincoln Laboratory (Lexington, MA)
- …Laboratory programs, as well as the implementation of the DoD Risk Management Framework (RMF) within assigned areas of responsibility. * Oversee the cybersecurity ... Report, and Continuous Monitoring Strategy. * Conduct security-focused configuration management activities for classified systems and networks in a variety… more
- Green Cell Consulting (Twentynine Palms, CA)
- …scans, Security Assessment Report (SAR), contingency plans, information assurance vulnerability management plans, cybersecurity waiver requests, cybersecurity ... Modeling and Simulation Systems is responsible to the Project Manager for the security of the local network and...Responsibilities Role: Cybersecurity SME + Provide cybersecurity technical and management support to the Project Team ISSEs at all… more