Type of Requisition: Regular Clearance Level Must Be Able to Obtain: Secret Public Trust/Other Required: None Job Family: InformationSecurity General Dynamics Information ... Technology (GDIT) is seeking an InformationSecurity Analyst Advisor/ CyberSecurity to work as a Product Owner in support development and testing of an Air Support Operations Center (ASOC ...
More details ❯
... the latest technology. The GCIO organization is recruiting for the position of Staff Vice President, Chief InformationSecurity Officer that will be remote with occasional travel (25 ... President, Chief InformationSecurity Officer will have oversight for all Cyber strategic planning and execution, providing guidance & standards to the Functional areas of the organization ...
More details ❯
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: NACI (T1) Job Family: InformationSecurity We are GDIT. We support ... one of us because it's embedded into every aspect of what we do. We are looking for a InformationSecurity Analyst Sr Advisor to support our Chronic Condition Warehouse (CCW ...
More details ❯
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: None Public Trust/Other Required: BI Full 6C (T4) Job Family: InformationSecurity GDIT, a Federal marketplace ... , and intelligence missions. GDIT is looking for a Senior Information Assurance / Information Systems Security Specialist to serve under the guidance of Security team managers for a large, complex ...
More details ❯
... Officer (CSO) identifies, investigates, mitigates, and resolves informationsecurity risks across an enterprise roll-out of a Federal COTS Electronic Health Records (EHR) solution ... , and standards administration. Serves as a leader for team investigations and addresses various informationsecurity and privacy issues. Has in-depth technical knowledge of cybersecurity ...
More details ❯
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: None Job Family: InformationSecurity We are GDIT. The people supporting and securing some of the most complex ... or mitigating controls - Conducts regular audits to ensure that systems are being operated securely, and information systems security policies and procedures are being implemented as defined ...
More details ❯
... to: - Determines enterprise information assurance and security standard for authentication and authorization. - Develops and implements information assurance/security standards and procedures ... , and evaluates security programs for an organization. - Recommends information assurance/security solutions to support customers' requirements. - Establishes and satisfies information assurance ...
More details ❯
... Program - Federal InformationSecurity Modernization Act (FISMA) of 2014 - NIST Cyber Security Framework (CSF) - NIST SP 800-53 Revision 4, Security and Privacy Controls for Federal ... Information Systems and Organizations - Possess one or more cyber security certifications, for example: - ISC2 Certified Information System Security Professional (CISSP), ISSAP or ISSEP ...
More details ❯
... and on-demand system audits and vulnerability assessments, to verify systems are being operated securely, and information systems security policies and procedures are being implemented ... investigations of information systems security violations and incidents, reporting as necessary to management - Monitors and analyzes Intrusion Detection Systems (IDS) to identify security ...
More details ❯
... of Information Systems Security Manager (ISSM) or Information Systems Security Engineer (ISSE) experience - Minimum 3 years of Risk Management Framework (RMF) for IT enterprise networks ...
More details ❯
By creating an alert, you agree to our T&Cs and Privacy Notice, and Cookie Use.