Search Results: 16,172 vacancies
...Description
EHS Technologies is seeking a full-time Information Systems Security Manager (ISSM) in support of Naval Surface Warfare Center... ...Full-Time/Part-Time
-unspecified-
Position
Engineer
Location
Philadelphia Navy Yard Office
About the...
Suggested
Full time
Part time
Remote job
...Description
Background Information:
Innovative Defense Technologies... ...complex, mission-critical systems in the US Department of... ...seeking an Information System Security Officer (ISSO) to be based in... ...:
~ Bachelor's degree in Engineering, Computer Science, Information...
Suggested
Local area
...Information Systems Security Specialists III
Location PA - Philadelphia
Job Code 10387
# of openings 5
Apply Now (
The Alaka`ina... ...Must have an Associates degree in a science, technology, engineering or mathematics, or related technical field.
+ In accordance...
Suggested
Holiday work
For contractors
Data Intelligence, LLC (DI) is searching for a full time Information System Security Officer III in Philadelphia, PA. This is an on-site position... .... We provide full life cycle system development, systems engineering, cybersecurity, and supporting analytical and logistics...
Suggested
Holiday work
Full time
...Information Systems Security Specialists II
Location PA - Philadelphia
Job Code 10386
# of openings 10
Apply Now (
The Alaka`ina Foundation Family of Companies (FOCs) has a potential need for Information Systems Security Specialists II to support a Navy...
Suggested
Holiday work
For contractors
Immediate start
Remote job
...characteristic protected by law.
Description
POSITION: Information System Security Officer (ISSO) - Full Time Position
LOCATION: Work is... ...Technologies is a cutting-edge IT, Cyber Security and Engineering Firm dedicated to solving the Department of Defense's...
Suggested
Full time
Part time
Remote job
...Vice President of Information Security
About the Company
Well-established provider of on-demand products
Industry
Information... ...are crucial for this leadership position.
Travel Percent
Less than 10%
Functions
Engineering
Information Technology...
Suggested
...Description
Job Description The Security Compliance Engineer works in the office of the CISO in the... ..., or confidentiality of data, systems, or services of the company and provide... ...creation and or maintenance of the Information Security Management System
Maintain...
Suggested
Contract work
Remote job
Work from home
Worldwide
Home office
...Chief Information Security Officer (CISO)
About the Company
Popular styling platform delivering... ...technology
data science
engineering
retail
merchandising
warehouse... ...scalability, and security of the company's systems, supporting its rapidly evolving...
Suggested
...$4.8+ billion credit union, has an immediate opening for a Information Systems Support Specialist I.This position provides an ultimate level... ...that affect the credit union.
Ensure work area is clean, secure, and well maintained in accordance with AMHFCU's Clean Desk...
Suggested
Full time
Work experience placement
Local area
Immediate start
Remote job
Night shift
Saturday
Afternoon shift
...Senior Director, Information Security
About the Company
Flourishing provider of enterprise... ...Health Care
Business Information Systems
Hospital
Medical
Information... ...Percent
Less than 10%
Functions
Engineering
Information Technology
Known Requirements...
Suggested
...Philadelphia headed by the Chief Information Officer (CIO). OIT oversees... ...investments; ensuring data security continuity; planning for... ...information security risk to systems and data throughout The City... ..., system analysis, software engineering, or a closely related field....
Suggested
Holiday work
Full time
Part time
Work experience placement
...succeed in today’s era of defense, security, maintenance engineering, logistics , and business transformation... ...To Operate (ATO) packages for USN systems, which include (but are not limited... ...for USN systems.
Maintain DoD Information Technology Portfolio Repository/...
Suggested
Full time
Interim role
...commitment to help them solve it. It's simply what we do.
As an Information Security Analyst I you'll drive important information security... ....
Essential Duties & Responsibilities:
Safeguard systems by monitoring computer networks and security tools to detect...
Suggested
For contractors
Work experience placement
...given moment, hundreds of complex networked computer systems are operating in tandem to keep ships and submarines operating... ...support, computer programming, web development and information security.
SOFTWARE ENGINEERING JOBS IN THE NAVY
INFORMATION SYSTEMS TECHNICIAN...
Suggested
Full time
Part time
Worldwide
Overseas
...NUTSHELL
Sciens Building Solutions is seeking an experienced Security Systems Technician with programming, commissioning, and... ...Responsible for reviewing system layouts and coordinating with engineering, project management, and sales departments for a successful...
Holiday work
Temporary work
Night shift
...Future Technologies is seeking a Information System Security Manager to join our winning team. FTI is a proven, employee-focused provider of... ...demonstrated competency with specific experience in Cyber Security, Engineering, Test & Evaluation, (T&E) and/or Security Control...
Full time
Local area
Worldwide
...America, Asia, Europe, and the Middle East, is seeking an Information Security Engineer to be responsible for assisting other team members in the... ...responsible for implementing and maintaining our security systems, identifying vulnerabilities, and ensuring that our data and...
Remote job
Local area
...projects such as web browsers, operating systems, server and systems software, and... ..., Software , Hardware, etc) .
Systems Engineer provides Subject Matter Expert level experience... ..., certain Personally Identifiable Information (PII) may be requested by our clients for...
Permanent employment
Role Summary:
URBN is seeking a highly skilled Information Security Manager. The ideal candidate will have a strong background in cybersecurity... ...and third-party partners to ensure the security of external systems and services.
Risk Assessment: Conduct regular risk...