Search Results: 213 vacancies
...Type: Contract
Job #2615
Title: Information Systems Security Officer
Location: Ft. Meade, MD
*Clearance: *Active... ...techniques/tools.
DoD 8570 compliance with Information Assurance Management (IAM) Level I or higher is required.
Experience developing...
Suggested
Contract work
Interim role
...We are seeking an experienced Information Systems Security Officer (ISSO). The ISSO serves as the principal advisor on all matters, technical and otherwise, involving the security of an information system. ISSOs are responsible for ensuring the implementation and maintenance...
Suggested
Holiday work
Temporary work
Local area
Remote job
Flexible hours
Plex Solutions, LLC is looking for an Expert level Cyber Security Analyst to work in the Chantilly, VA area to work on exciting cybersecurity work.
Minimum Requirements:
11+ years of experience in 3 or more of the following:
Analysis
Network Engineering
Network Security...
Suggested
...looking for.
Job Description:
Delivering Effective Information Security Systems Management in a Fast-Paced and Dynamic Environment
You are keenly... ...execution teams. In addition to leading a team of security IT professionals, you will regularly interact with our Parsons...
Suggested
Holiday work
Local area
Worldwide
Flexible hours
..., high tempo operations center. In depth technical knowledge, management, and analytic skills address senior command requirements, subordinate... ...holistic enterprise defensive strategies for enterprise cyber security capabilities implemented within the infrastructure of the...
Suggested
Remote job
...Suitability:
Public Trust/Other Required:
Job Family:
Cyber Security
Job Qualifications:
Skills:
ACAS, Enterprise Mission... ...devices
Work with the Information Assurance Team, Security manager and GOVT ISSM to ensure any Data Spills are handled...
Suggested
Holiday work
Full time
Temporary work
Part time
Work experience placement
Immediate start
Remote job
Worldwide
Flexible hours
Job Description - Information System Security Officer (PFO0002UW) **Job Description**
Information... ...and act as a liaison between the IT and Security functions. Under minimal supervision... ...for the development, administration and management of classified information systems and...
Suggested
Full time
...Information Systems Security Officer (ISSO) - Intermediate
Location: Fort Meade,... ...Authorization Package.
Conduct configuration management for security-relevant changes to software... ...security status.
Maintain and enforce IT security policies and implementation...
Suggested
Full time
For contractors
Work experience placement
..."Employee driven...customer focused." We build, operate and secure networks and infrastructure.
*** Requires a Top Secret/SCI clearance... ...security violations and incidents, reporting as necessary to management
•Researches, evaluates, tests, recommends, communicates and...
Suggested
Contract work
...Information Systems Security Officer
Job Category: Information Technology
Time Type: Full time
Minimum Clearance Required to Start: TS/SCI with Polygraph
Employee Type: Regular
Percentage of Travel Required: Up to 10%
Type of Travel: Local
* * *
CACI...
Suggested
Full time
Contract work
Work experience placement
Local area
..."Employee driven...customer focused." We build, operate and secure networks and infrastructure.
*** Requires a Top Secret/SCI clearance... ...and procedures are established and followed. Assists with the management of security aspects of the information system and performs day-...
Suggested
Information Security Manager II - TS/SCI
Arlington, VA
Join an outstanding team that offers exciting job opportunities with the goal of providing... ...- Responsible for implementing and developing the DHS IT security
- Gathering and organizing technical information about...
Suggested
Holiday work
Temporary work
Flexible hours
...Solutions is seeking Information Systems Security Officers (ISSO) to join us on a contract... ...Authorization and Assessment process under the Risk Management Framework (RMF) for new and existing... ...security status.
Maintain and enforce IT security policies and implementation...
Suggested
Contract work
Temporary work
Work experience placement
**Information Systems Security Officer**
at T-Rex Solutions Remote T-Rex is looking for an... ...candidate will support and lead Risk Management Framework (RMF) activities including the... ...identify flaws, threats, and risks in emerging IT projects, and develop technical in-depth...
Suggested
For contractors
Work experience placement
Remote job
...finalist in 2021!
Belay Technologies seeks an Information Systems Security Officer with more than fourteen (14); bachelors degree in... ...security posture. Assist with information system security management and day-to-day security operations. Perform vulnerability/risk...
Suggested
Holiday work
Contract work
** IAES - Information System Security Officer - Senior**
**Zavda Technologies, LLC Fort Meade, MD 20755**
* Email Job
* Share on... ...Owned, and Woman-owned small business that offers leading IT management, Intel, and Cyber opportunities in both the private and public...
For contractors
...Description
*DoD 8570 compliance with Information Assurance Management (IAM) Level 1 or higher is required
ISSO to support the DCS... ...audit logs, troubleshooting issues, and reviewing and updating security controls. Must be familiar with the customers security...
...Intelligence Group has a career opportunity in Columbia, MD. for an Information Systems Security Officer (ISSO)
Primary Responsibilities
Provides support to Leidos Information System Security Manager (ISSM) for appropriate operational IA posture for a system/program/enclave and...
Temporary work
Work experience placement
...promoting within. Many of our employees began their careers as Security Officers, and today we are proud to say they have become a... ...and equipment provided
~ Professional/Friendly Staff and Site Management
Brosnan Risk Consultants provides exceptional security...
Full time
Part time
Local area
...of defense instruction, guidance, and policy.
Identify threats to the enterprise and provide mitigation strategies to improve security and reduce the attack surface.
Perform analysis by leveraging serialized threat reporting, intelligence product sharing, OSINT,...