There is a slight chance of up to 10% domestic travel to locations where the system is hosted if issues arise.
|
|
- Bernice Johns
- 5 years ago
- Views:
Transcription
1 Any questions contact Chris Grindle via LinkedIn.com Information Systems Security Officer 510 Travel: 10% Clearable to Top Secret The ISSO is the principal point of contact for information assurance activities at the IT system level. The ISSO is responsible for ensuring that management; operational and technical controls for securing either National Security Systems or SBU level IT Systems are in place and are followed. This includes ensuring that appropriate steps are taken to implement information security requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. It is preferred that this person be a current Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or possess a similar security professional certification. Strong relevant experience and education can substitute for these certifications. Candidates must possess a Bachelor s Degree and 2 years or 4 years of relevant IA experience with no degree. Must possess experience with NIST standards. There is a slight chance of up to 10% domestic travel to locations where the system is hosted if issues arise. Executive Administrative Assistant/Business Analyst 515 Clearable to Secret Duties/Responsibilities: **CANDIDATE MUST POSSESS EXPERIENCE IN A GOVERNMENT ENVIRONMENT** Work closely with IT Security staff and support contractors to administer all business aspects of a leadingedge integrated information security program for TSA s IT Security Division. Must possess a strong 1
2 background using Microsoft Office Suite, particularly Excel. Must be articulate, detail oriented and service oriented, and possess the ability to multi-task, prioritize and make swift and efficient transitions between competing objectives. Must be a self-starter, quick to adapt and keep up with the pace of the office environment. Must possess a minimum of 2 years of professional experience. It is highly preferred that candidates possess document management experience, particularly in a security environment. Certification Specialist/Security Test Engineer 512 Location: Reston, VA Project Oriented Clearable to Top Secret Will be responsible for providing senior C&A support to numerous government agencies on multiple programs. Will function as subject matter expert in C&A across the organization. Must possess experience with NIST standards. Requires 5 years of related security experience preferably with a BS degree. Candidates must possess experience with vulnerability scanning and assessments. The tools used by this customer are Nessus, AppDetective, WebInspect and ISS, so should have experience with these or similar tools. It is preferred that this person be a current Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or similar security professional certification.) Candidate must be flexible and willing to travel to customer sites when on-site testing is required. 2
3 Information Systems Security Officer 507 Top Secret and clearable to TS/SCI Candidate must have 5 years IT Security experience, with at least 4 years of ISSO working experience. B.S. degree is preferred. Ideal candidate will be familiar within developing Certification and Accreditation (C&A) documentation for assigned systems in accordance with established federal government regulations and guidelines, as well as NIST documentation and industry best practices. Will also consider candidates with a strong DITSCAP/DIACAP background. CISSP and working knowledge of the ArcSight SIM (analyst experience) is a plus. Linux Engineer 483 Location: Crystal City, VA Mantech/FTTTF Top Secret w/ the ability to get SCI Must possess at least 1 year experience with PhD or at least 3 years experience with Masters (MA/MS) or at least 5 years experience with Bachelors (BA/BS) or at least 8 years experience with High School graduate education. Experience must be as system administrator or Engineer. Specific experience with the UNIX operating system (OS), preferably, Redhat LINUX, and also Windows. Experience building, installing, and maintaining systems in a networked environment. Also, experience with installing and configuring a variety of LINUX and Windows applications; including some database software applications such as Oracle. Experience with DNS, scripting, network protocols, HTTP, web server applications and backup applications such as Legato or Veritas NetBackup is preferred. Strong technical and written/oral communication skills are required. Must be able to work well both independently and as part of a team. Must be able to effectively interact with senior management as well as team leads in a matrixed team environment. Manages priority changes as directed by contractor supervisors. Hands-on experience with Linux, specifically Red Hat LINUX is required. RHCE is preferred but not required. In addition, familiarity with yum, experience with Oracle RAC, as well as Oracle, scripting, Solaris, and Windows 2000 are pluses. C&A Engineer III 426 3
4 Top Secret and have been granted SCI eligibility. Candidate must possess a 5 years related experience. CISSP Desired A BS degree is preferred. Experience in various C&A disciplines, to include DITSCAP or DIACAP, DCID 6/3 Vulnerability assessment experience Familiarity with DOD STIG documentation and NSA configuration guide. Vulnerability/Penetration Tester 496 Location: Washington, DC CSC/FBI Travel: 10% Top Secret clearance is required w/ the ability to get SCI. Successful candidates must possess working knowledge of common commercial and/or open source vulnerability assessment tools and techniques used for evaluating operating systems, networking devices, databases and web servers. Applicants may be asked to demonstrate their knowledge in a computer laboratory environment. Successful candidates should be familiar with certification and accreditation processes in general; experience with the NIST 800 series of documents would be advantageous. Successful candidates must be able to quickly master new technology/software for the purposes of evaluating or subverting the security functionality of the technology/software. Programming and/or Web testing experience is a plus. Successful candidates should have 9 years of experience in vulnerability assessment or a technical field within information security, as well as a degree in a related field. If no degree, must possess ten years of related experience. Professional certifications and progress toward a college degree will be taken into consideration. Will involve about 10% travel. 4
5 IDS Analyst Mid Level (3 rd Shift) 516 Location: Washington D.C. Top Secret clearance is required w/ the ability to get SCI 2-4 years experience related IDS Analysis experience. Strong IDS Monitoring/Analysis experience required. ArcSight or other SIM experience desired. Work Schedule: Midnight Shift 10pm - 6am and 12 hour weekend shifts. Sr. Software Engineer Location: Herndon, VA Top Secret Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 9 years of professional experience; or 7 years of professional experience with a related Masters degree. 9 years experience in full lifecycle software development with at least five of those years working on Object-Oriented development using Java/J2EE. Prior experience with Automated Test Tools (such as JUnit, Cruise Control) and technical software documentation and modeling using UML are required. Desired Skills: Other Java frameworks such as Spring, Struts, AJAX Apache Ant build script experience Prior Experience with Forms/Reports Design/User Interfaces Prior experience integrating with databases and web services Experience with IBM WebSphere software, Documentum, Business Objects ThingFinder, Adobe Livecycle ES, Crystal Reports Familiarity with Rational software tools (ClearCase, ClearQuest and RequisitePro) Prior experience with 508 compliance 5
6 ArcSight Engineer 511 Location: Herndon, VA Top Secret Bachelors degree from an accredited college in a related discipline, or equivalent experience/combined education, with 14 years or more of professional experience; or 12 years of professional experience with a related Masters degree. Considered an expert, authority in discipline. Technical leadership, self-starter Security experience, and experience with auditing solutions Candidates should have at least 2-3 years of hands-on working experience with ArcSight. Should be familiar with deploying, installing and administering ESM 4.0 on a Windows 2003 environment (Solaris/Oracle database back-end). Candidates must also have experience developing use cases and Flex Connectors. A development and integration background is a plus, to include skills such as LDAP integration and PKI integration. Network Security/McAfee SME 509 Location: San Antonio, TX Secret clearance is required and must be clearable to Top Secret Candidates must possess GSEC and Security+ and SCNP and SSCP OR one of the following: CISA or CISSP or GSE or SCNA. Candidates must have SME level experience administering and configuring McAfee epo 4.0 and HIPS. Experience with IntruShield, Anti-Virus, or Device Control (NAC) is desired. HBSS experience is ideal. Additional McAfee product experience is a plus. Candidates should have a strong background in systems administration and/or network engineering. Candidate should have solid consulting skills (i.e. professionalism, communication, etc.) 6
7 McAfee Security Engineer 490, 492, 493, 503 Location: Colorado Springs, CO (490), Newport News, VA (492), Wichita, KS (493), Sumter, SC (503) Secret clearance is required; Top Secret is preferred. Candidates must have experience administering and configuring McAfee epo 4.0 and HIPS. Experience with IntruShield is strongly desired. HBSS experience is ideal. Additional McAfee product experience is a plus. Candidates should have a strong background in systems administration and/or network engineering. Deployment experience with McAfee or similar product is highly desired. Again we can switch out the deployment experience with the previous mentioned McAfee training Candidate should have solid consulting skills (i.e. professionalism, communication, etc.) 7
Cybersecurity Employment SecureNinja
Cybersecurity Employment Opportunities @ SecureNinja CyberSecurity, Technical Engineer Responsible for security measures for networks & information. Senior Software Security Consultant Location: Alexandria,
More informationOverview of role skill sets
Cloud Systems Administrator Ability to obtain and maintain a Secret Security Clearance Subject Matter Expertise in Pivotal Cloud Foundry Bachelors with 4+ years of experience in related fields or technologies
More informationSecurity Monitoring Engineer / (NY or NC) Director, Information Security. New York, NY or Winston-Salem, NC. Location:
Position: Reports to: Location: Security Monitoring Engineer / (NY or NC) Director, Information Security New York, NY or Winston-Salem, NC Position Summary: The Clearing House (TCH) Information Security
More informationSALARY $ $72.54 Hourly $3, $5, Biweekly $8, $12, Monthly $103, $150, Annually
SALARY $49.72 - $72.54 Hourly $3,977.88 - $5,803.27 Biweekly $8,618.75 - $12,573.75 Monthly $103,425.00 - $150,885.00 Annually ISSUE DATE: 03/21/18 THE POSITION DIRECTOR OF CYBER SECURITY OPEN TO THE PUBLIC
More informationCACI USSOCOM IT EOM REQUIREMENTS
Labor Category Certifications Experience Asset Manager ITIL Foundations Five years of experience in an IT and asset management role. Prior experience with Microsoft Enterprise Licensing is highly valued.
More informationSolutions Technology, Inc. (STI) Corporate Capability Brief
Solutions Technology, Inc. (STI) Corporate Capability Brief STI CORPORATE OVERVIEW Located in the metropolitan area of Washington, District of Columbia (D.C.), Solutions Technology Inc. (STI), women owned
More informationHISTORY: ADMINISTRATION AND COST CONTROL:
HISTORY: SofiaITC was incorporated in 2012 as a Veteran Owned Small Business (VOSB) Enterprise IT and Cybersecurity Solutions and Services provider by Mr. James Quilty following 21 years of combined Military
More informationCITY OF MONTEBELLO SYSTEMS MANAGER
CITY OF MONTEBELLO 109A DEFINITION Under general administrative direction of the City Administrator, provides advanced professional support to departments with very complex computer systems, programs and
More informationSITEC II Labor Category Program Manager (PM) SITEC II Experience SITEC II Certification
Program (PM) Information Technology Project (L1) Project (L2) Systems Analyst Technical Writer Database (Tier 2) Database (Tier 3) WEB (Microsoft SharePoint) WEB Messaging Network Architect Network Masters
More informationKizano Corp Management Services
K Management Services General Services Administration Federal Supply Schedule Professional Services Schedule (PSS) Contract Number 47QRAA18D00B9 Effective June 27, 2018 300 Ellicott Street, Suite E Occoquan,
More informationHRSD Position Description: UNIX Systems Administrator
HRSD Position Description: UNIX Systems Administrator Section I. Section II. Section III. Position Reference Information a. Department Finance and Administration b. Division Information Technology c. Position
More informationLABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience
SIN 132-51 - Labor Category Requirements and Descriptions LABOR CATEGORIES, EDUCATION AND YEARS OF EXPERIENCE Years No. Labor Categories Education Experience ANT-001 Technical Expert Level 5 BA/BS 6 ANT-002
More informationThe Center for Internet Security
The Center for Internet Security Measurably reducing risk through collaboration, consensus, & practical security management Content of this Presentation: I. Background II. Univ. of CA Schools Rights and
More informationKENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT)
KENYA SCHOOL OF GOVERNMENT EMPLOYMENT OPORTUNITY (EXTERNAL ADVERTISEMENT) 1. DIRECTOR, LEARNING & DEVELOPMENT - LOWER KABETE Reporting to the Director General, Campus Directors will be responsible for
More information1 RESEARCH COURT, SUITE 340 ROCKVILLE, MD GNS GNS-BD-CC
GLOBAL NETWORK SYSTEMS, INC. (GNS) 1 RESEARCH COURT, SUITE 340 ROCKVILLE, MD 20850 301-921-4GNS 301-921-4467 www.gns-us.com hqoffice@gns-us.com GNS-BD-CC-4001 209 2.09 Global Network Systems of Maryland,
More informationPosition Descriptions 14PSX0338 NASPO Multi State IT Vendor Managed Service Providers Page 1 of 25
Page 1 of 25 Application Developer Full-time professional work experience in the development and support of Information Technology applications. Successful completion of an Information Technology Certification
More informationOur mission is simple, helping our clients succeed
Corporate Background Global Network Systems of Maryland, Inc. (GNS, Inc.) was established in 1998 and incorporated in 2000. In 2006, GNS, Inc. was ranked number 20 out of Washington Technology s FAST 50
More informationDoD Directive (DoDD) 8570 & GIAC Certification
DoD Directive (DoDD) 8570 & GIAC Certification Date Updated: October 2010 What is DoDD 8570? Department of Defense Directive 8570 provides guidance and procedures for the training, certification, and management
More informationManTech Advanced Systems International 2018 Security Training Schedule
ManTech Advanced Systems International 2018 Security Training Schedule Risk Management Framework Course Dates Course Location Course Cost February 12 15, 2018 Las Vegas, NV $1,950.00 March 12 15, 2018
More informationSYSTEM ADMINISTRATOR JOB DESCRIPTION
Department: IT Reports To: IT Director Classification: Exempt Salary Grade: 9 ($43,201.60-$62,899.20) Summary Under the direction of the IT Director, this position will ensure quality and responsive services
More informationCITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst
CITY OF SAN ANTONIO invites applications for the position of: Web Design Senior Analyst SALARY: $24.83 - $37.24 Hourly $51,644.58 - $77,467.00 Annually OPENING DATE: 02/23/17 CLOSING DATE: 03/23/17 11:59
More informationSystems Administrator / Systems Analyst
Systems Administrator / Systems Analyst Closing date: august 17, 2018 Full time position Job Summary CSE is currently looking to fill several systems administrators and systems analysts positions. These
More informationDATABASE ADMINISTRATOR
DATABASE ADMINISTRATOR Department FLSA Status Reports To Supervises Information Technology Exempt IT Director N/A DISTINGUISHING CHARACTERISTICS: The principal function of an employee in this class is
More informationCompTIA Certification Renewal Policy and Continuing Education (CE) Program. Kyle Gingrich Senior Director, Product Management
CompTIA Certification Renewal Policy and Continuing Education (CE) Program Kyle Gingrich Senior Director, Product Management kgingrich@comptia.org CompTIA s Mission Our Mission Educate The IT Community
More informationGeneral Dynamics Information Technology, Inc.
General Dynamics Information Technology, Inc. GS-35F-080CA SIN 132-45 A,B,C,D Highly Adaptive Cybersecurity Services (HACS) Labor Category Requirements and Descriptions LABOR CATEGORIES, EDUCATION AND
More informationDEPARTMENT OF HEALTH and HUMAN SERVICES. HANDBOOK for
DEPARTMENT OF HEALTH and HUMAN SERVICES HANDBOOK for FEDERAL ACQUISITION CERTIFICATION PROGRAM/PROJECT MANAGERS Issuer Office of the Secretary Office of the Assistant Secretary for Financial Resources
More informationCYBER APPRENTICESHIP. Dr Leigh Armistead, President
CYBER APPRENTICESHIP Dr Leigh Armistead, President 1 EVERYBODY HAS THE SAME ISSUE 2 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a), SB with core competencies in IT security,
More informationMohammad Shahadat Hossain
Mohammad Shahadat Hossain Principal Security Architect at Grameenphone Limited Summary Has extensive knowledge and experience on following:- NIST Cyber Security Framework SANS Top 20 Security Control Network
More information**The Florida Lottery is not a State Personnel System Employer** TECHNICAL ANALYST II - POSITION NUMBER
TECHNICAL ANALYST II Req No: 36000206-51187844-20140327120006 Working Title: TECHNICAL ANALYST II Broadband/Class Code: 319516 Position Number: 36000206 Annual Salary Range: $53,293.68 - $101,352.58 Announcement
More informationIntroduction to CPIP
Introduction to CPIP Agenda What is the CPIP TM Credential? Credential Benefits and Uses Eligibility & Examination Eligibility Application Exam Preparation, Application, Execution Recertification Q &
More informationNATIONAL GOVERNORS ASSOCIATION MEET THE THREAT October 27,
NATIONAL GOVERNORS ASSOCIATION MEET THE THREAT October 27, 2016 Labor Market Intelligence What is LMI? Northern Virginia labor market The Cybersecurity sector NOVA s role Current statistics What is LMI?
More informationITU CBS. Digital Security Capacity Building: Role of the University GLOBAL ICT CAPACITY BUILDING SYMPOSIUM SANTO DOMINGO 2018
GLOBAL ICT CAPACITY BUILDING SYMPOSIUM ITU CBS SANTO DOMINGO 2018 Digital Capacity Building: Role of the University 18 20 June 2018 Santo Domingo, Dominican Republic Dr. Nizar Ben Neji Faculty of Sciences
More informationWebsphere Force Uninstall Application Server 7 Linux Installation
Websphere Force Uninstall Application Server 7 Linux Installation You also use Installation Manager to easily uninstall the packages that it installed. Linux Intel, os=linux,arch=x86, Linux Intel 32 bit
More informationOliopäivät Modelling Now and in the Future, with Acronyms or without = RSA
IBM Software Group Oliopäivät 28-29.11.2006 Modelling Now and in the Future, with Acronyms or without = RSA rami.talme@fi.ibm.com 2006 IBM Corporation IBM Software Group Rational software The business-driven
More informationCertified Information Systems Auditor Training and Certification
Certified Information Systems Auditor Training and Certification Course Description Certified Information Systems Auditor (CISA) Training designation is a globally recognized certification for IS audit
More informationApplication Developer at US Department of Education - Office of Federal Student Aid
Tim Bornholtz Application Developer at US Department of Education - Office of Federal Student Aid tim@bornholtz.com Specialties Detailed understanding of the higher education financial aid process. Concrete
More information01. Assistant Manager/Officer-Software Development
01. Assistant Manager/Officer-Software Development Graduation in Computer Science / Engineering from a reputable foreign or HEC recognized university. Relevant Professional Qualifications / Certifications
More informationLaw Enforcement Commercial Price List ManTech International Corporation August 2017
Law Enforcement Commercial Price List ManTech International Corporation August 2017 Table of Contents Rates and Description... 3 General Guidelines... 54 Contact Information... 56 Page - 2 Rates and Description
More informationCyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships. from the most trusted name in information security
CyberSecurity Training and Capacity Building: A Starting Point for Collaboration and Partnerships About SANS The SANS (SysAdmin, Audit, Network, Security) Institute Established in 1989 Cooperative research
More informationCISA Training.
CISA Training www.austech.edu.au WHAT IS CISA TRAINING? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual
More informationAVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer
AVP/CIO IT Candidate Campus Visit Friday, April 17, 2015 Mr. Kenneth Ihrer 8:30 9:00AM Breakfast with Various Members of the Search Comm./Chair @ A306A 9:00 9:45AM Meeting with Provost and Deans @ A310
More informationIT Support Officer (Ongoing) Brisbane
IT Support Officer (Ongoing) Brisbane SAE Institute, with 54 campuses in 28 countries, has been setting the global benchmark for creative media education since 1976. In Australia, we proudly offer government
More informationCyber Update Mr. Paul Phillips AFLCMC/WNSA (937) May 17
Cyber Update Mr. Paul Phillips AFLCMC/WNSA (937) 255-2328 Paul.phillips.12@us.af.mil 9 May 17 Disclaimer: The information provided herein represents the Government s best understanding of the procurement
More informationGENERAL SERVICES ADMINISTRATION
GENERAL SERVICES ADMINISTRATION Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and
More informationMidpeninsula Regional Open Space District
Midpeninsula Regional Open Space District SENIOR TECHNOLOGIST DEFINITION Under general direction, performs the most complex and varied technical tasks related to the design, configuration, troubleshooting,
More informationRyan Rich - Software Developer & Architect
Ryan Rich - Software Developer & Architect Oceanside, CA 858-523-8540 ryanrich@richservices.com http://linkedin.com/in/ryanrich Full stack polyglot programmer and technical leader, with a strong interest
More informationIntroducing Maryville University s CYBER SECURITY ONLINE PROGRAMS. Bachelor of Science in Cyber Security & Master of Science in Cyber Security
Introducing Maryville University s CYBER SECURITY ONLINE PROGRAMS Bachelor of Science in Cyber Security & Master of Science in Cyber Security The cyber security industry is calling for more experts. And
More informationTHIS IS ONLY SAMPLE RESUME - DO NOT COPY AND PASTE INTO YOUR RESUME. WE ARE NOT RESPONSIBLE Name: xxxxxx
Name: xxxxxx Email ID: xxxxxx Ph: xxxxxx Summary: Over 7 years of experience in object oriented programming, design and development of Multi-Tier distributed, Enterprise applications using Java and J2EE
More informationApplication for Certification
Application for Certification Requirements to Become a Certified Information Security Manager To become a Certified Information Security Manager (CISM), an applicant must: 1. Score a passing grade on the
More informationWhat can I do with a major in Computer Science?
Lewis-Clark State College offers a Bachelor of Arts or Science Degree in Computer Science through the Natural Sciences and Mathematics Division. You can learn more about the Natural Sciences and Mathematics
More informationVACANCY ANNOUNCEMENT
THE UNITED REPUBLIC OF TANZANIA PRESIDENT S OFFICE PUBLIC SERVICE RECRUITMENT SECRETARIAT Ref.No.EA.7/96/01/J/81 20 th December, 2017 VACANCY ANNOUNCEMENT On behalf of the Tanzania Communications Regulatory
More informationGeneral Services Administration Multiple Award Schedule (MAS) 70 General Purpose Commercial Information Technology (IT) Equipment, Software & Services
General Services Administration Multiple Award Schedule (MAS) 70 General Purpose Commercial Information Technology (IT) Equipment, Software & Services Commercial Labor Category Descriptions Contractor:
More informationAchieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients
Achieving a FIPS Compliant Wireless Infrastructure using Intel Centrino Mobile Technology Clients This document is provided as is with no warranties whatsoever, including any warranty of merchantability,
More informationYou Can Click at the enclosed Link to check out AATP Authorization:
Apple Education App Development Training Introduction to Swift 4 Introduction to the ios 11 SDK App Development with Swift 4 macos and OS X Training macos Support Essentials 10.12 (Sierra 101) macos Server
More informationUnix Linux Manual Systems Administrator Job Description
Unix Linux Manual Systems Administrator Job Description Sr. Linux/UNIX System/Network Administrator. Leidos 113 reviews - Laurel, MD Develop system Architecture and system design documentation. Guide system
More informationFederal Acquisition Service Authorized Federal Supply Schedule Price List
Federal Acquisition Service Authorized Federal Supply Schedule Price List On-line access to contract ordering information, terms and conditions, up-to-date pricing, and the option to create an electronic
More information3. LABOR CATEGORY DESCRIPTIONS
3. LABOR CATEGORY DESCRIPTIONS 001 - Consulting Systems Advisor Fifteen or more (15+) years of experience within the industry. The Consulting System Advisor develops and applies advanced methods, theories,
More informationCYBER APPRENTICESHIP. Dr. Leigh Armistead, President
CYBER APPRENTICESHIP Dr. Leigh Armistead, President 1 OVERVIEW Peregrine Technical Solutions, LLC. (Peregrine) is a SBA certified 8(a) business with core competencies in IT security, IA and cyber warfare.
More informationPOSITION DESCRIPTION
UNCLASSIFIED IT Security Certification Assessor POSITION DESCRIPTION Unit, Directorate: Location: IT & Physical Security, Protective Security Wellington Salary range: H $77,711 - $116,567 Purpose of position:
More informationTEL2813/IS2820 Security Management
TEL2813/IS2820 Security Management Security Management Models And Practices Lecture 6 Jan 27, 2005 Introduction To create or maintain a secure environment 1. Design working security plan 2. Implement management
More informationCOURSE BROCHURE CISA TRAINING
COURSE BROCHURE CISA TRAINING What is CISA? The CISA, Certified Information Systems Auditor, is a professional designation which provides great benefits and increased influence for an individual within
More informationNEW ENGLAND: Connecticut - Maine - Massachusetts - New Hampshire - Rhode Island - Vermont CONTRACTOR: Uwork.com dba Covendis
UWork.com dba Covendis Page 1of 10 NEW ENGLAND: Connecticut - Maine - Massachusetts - New Hampshire - Rhode Island - Vermont CONTRACTOR: Uwork.com dba Covendis Portion of business to Micro/Small/Minority/Woman-owned
More informationJob Description: Junior Front End Developer
Job Description: Junior Front End Developer As a front end web developer, you would be responsible for managing the interchange of data between the server and the users, as well as working with our design
More informationAn Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP)
An Introduction to Department of Defense IA Certification and Accreditation Process (DIACAP) Solutions Built On Security Prepared for The IT Security Community and our Customers Prepared by Lunarline,
More informationVice President and Chief Information Security Officer FINRA Technology, Cyber & Information Security
Plenary Session: Cybersecurity the Current Regulatory Environment: Insight from Regulators and Industry Experts Thursday, February 22 3:45 p.m. 4:45 p.m. With recent high-profile data breaches, cybersecurity
More informationOperations & Technology Seminar. Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ
Operations & Technology Seminar Tuesday, November 8, 2016 Crowne Plaza Monroe, Monroe Township, NJ Operations & Technology Roundtable Crowne Plaza Monroe, Monroe Township, NJ Tuesday, November 8, 2016
More informationEXTERNAL VACANCY CIRCULAR NO 3. OF 2018
EXTERNAL VACANCY CIRCULAR NO 3. OF 2018 Botswana Unified Revenue Services (BURS) is a semi-autonomous organization of Government responsible for assessing and collecting tax revenue as well as border administration.
More informationSecurity Management Models And Practices Feb 5, 2008
TEL2813/IS2820 Security Management Security Management Models And Practices Feb 5, 2008 Objectives Overview basic standards and best practices Overview of ISO 17799 Overview of NIST SP documents related
More informationBusiness Architecture Implementation Workshop
Delivering a Business Architecture Transformation Project using the Business Architecture Guild BIZBOK Hands-on Workshop In this turbulent and competitive global economy, and the rapid pace of change in
More informationDefense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs
Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationAutomated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk
Automated Firewall Change Management Securing change management workflow to ensure continuous compliance and reduce risk Skybox Security Whitepaper January 2015 Executive Summary Firewall management has
More informationLes joies et les peines de la transformation numérique
Les joies et les peines de la transformation numérique Georges Ataya CISA, CGEIT, CISA, CISSP, MSCS, PBA Professor, Solvay Brussels School of Economics and Management Academic Director, IT Management Education
More informationJob Specification & Recruiting Profile of Vacancy
Job Specification & Recruiting Profile of Vacancy 26 March 2019 The following vacancy exists at NSFAS in Cape Town. Position Information Security Analyst Type & Grade Permanent, Grade 11 Vacancy No 76
More informationINFORMATION TECHNOLOGY APPLICATIONS DEVELOPER I (7989) INFORMATION TECHNOLOGY APPLICATIONS DEVELOPER II (7990)
County of Orange Class Code: 7989 & 7990 Revised: 02-04-14 Established: 04-01-11 INFORMATION TECHNOLOGY APPLICATIONS DEVELOPER I (7989) INFORMATION TECHNOLOGY APPLICATIONS DEVELOPER II (7990) DEFINITION
More informationTina Ladabouche. GenCyber Program Manager
Tina Ladabouche GenCyber Program Manager GenCyber Help all students understand correct and safe on-line behavior Increase interest in cybersecurity and diversity in cybersecurity workforce of the Nation
More informationCritical Infrastructures and Cyber Protection Center (CICPC) Professional Development Programs. FISMA Compliance Review Program Sample Syllabus FISMA
Critical Infrastructures and Cyber Protection Center (CICPC) Professional Development Programs FISMA Compliance Review Program Sample Syllabus FISMA ICP-086-Pxx (class dates) Live on Weekdays Lunchbox
More informationAffordable Security. Sarah Pramanik April 10, 2013
Affordable Security Sarah Pramanik April 10, 2013 It s a Balancing Act Affordability Security 2 Overview Defining Cyber Security Defense in Depth Program Risk vs. Security Risk Life Cycle Phases Pre-proposal/Proposal
More informationCompliance with NIST
Compliance with NIST 800-171 1 What is NIST? 2 Do I Need to Comply? Agenda 3 What Are the Requirements? 4 How Can I Determine If I Am Compliant? 5 Corserva s NIST Assessments What is NIST? NIST (National
More informationGet The Respect You Deserve With Credentials From APWA
Get The Respect You Deserve With Credentials From APWA Accreditation Certified Public Fleet Professional Certified Public Infrastructure Inspector Certified Stormwater Manager The Credentialing Department
More informationTRIAEM LLC Corporate Capabilities Briefing
TRIAEM LLC Corporate Capabilities Briefing 3/4/ 1 CORPORATE OVERVIEW CORPORATE VALUES MISSION STATEMENT SERVICES WORKFORCE EXPERIENCE CORPORATE CONTACTS 3/4/ 2 CORPORATE OVERVIEW TRIAEM is certified through
More informationPOSITION DESCRIPTION
State of Michigan Civil Service Commission Capitol Commons Center, P.O. Box 30002 Lansing, MI 48909 Position Code 1. INTCSPL3D16N POSITION DESCRIPTION This position description serves as the official classification
More informationDeveloping Career-Relevant Academic Programs
2016 USENIX Summit for Educators in System Administration Developing Career-Relevant Academic Programs A Case Study: UMUC s B.S. Program in Computer Networks & Cybersecurity S. K. Bhaskar (S.Bhaskar@umuc.edu)
More informationPersonnel Certification
Personnel Certification Facilitating the Growth of a Global Economy Roy A. Swift, Ph.D. Senior Director, Personnel Credentialing Accreditation Programs American National Standards Institute Building a
More informationStudent Guide Course: Introduction to the NISP Certification and Accreditation Process
Course: Introduction to the NISP Certification and Accreditation Process Lesson 1: Course Introduction Course Information Purpose Audience Pass/Fail % 75% Estimated completion time Provides training on
More informationThis is to certify that. Chris FitzGerald. has completed the course. Systems Security Engineering _eng 2/10/08
This is to certify that Chris FitzGerald has completed the course Systems Security Engineering - 206760_eng on 2/10/08 Systems Security Engineering About This Course Overview/Description To define the
More informationINFORMATION TECHNOLOGY ANALYST I//II
NOVEMBER 2016 FLSA: IT ANALYST I = NON-EXEMPT IT ANALYST II = EXEMPT Bargaining Unit: JCN: INFORMATION TECHNOLOGY ANALYST I//II DEFINITION Under general supervision or direction, provides professional
More informationINFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst II
Adopted: July 2000 Revised : April 2004; August 2009; June 2014; February 2018 INFORMATION TECHNOLOGY NETWORK ADMINISTRATOR ANALYST Series Specification Information Technology Network Administrator Analyst
More informationSTUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences
STUDENT LEARNING OUTCOMES Beacom College of Computer and Cyber Sciences Undergraduate Programs - Bachelor B.S. Computer Game Design Upon completion of the B.S. degree in Computer Game Design, students
More informationVal-EdTM. Valiant Technologies Education & Training Services. Workshop for CISM aspirants. All Trademarks and Copyrights recognized.
Val-EdTM Valiant Technologies Education & Training Services Workshop for CISM aspirants All Trademarks and Copyrights recognized Page 1 of 8 Welcome to Valiant Technologies. We are a specialty consulting
More informationPROFESSIONAL SERVICES (Solution Brief)
(Solution Brief) The most effective way for organizations to reduce the cost of maintaining enterprise security and improve security postures is to automate and optimize information security. Vanguard
More informationIT SECURITY OFFICER. Department: Information Technology. Pay Range: Professional 18
Pierce County Classification Description IT SECURITY OFFICER Department: Information Technology Job Class #: 634900 Pay Range: Professional 18 FLSA: Exempt Represented: No Classification descriptions are
More informationHoping my knowledge, skills and experience could be used by you and your company I appreciate in advance your time and consideration.
To Whom It May Concern: My name is Juan Jose Luna Castillo, born in Mexico City where I achieved a Bachelor s Degree in Electronics from the Universidad del Valle de Mexico. With over fourteen-year experience
More informationGraduate Trainee (Scheme A -CAI)
Graduate Trainee (Scheme A -CAI) Follow the structured and comprehensive 2 year training program certified by HKIE. Working under supervision of executives and managements Assist to prepare regular presentations
More informationPosition Description IT Auditor
Position Title IT Auditor Position Number Portfolio Performance and IT Audit Location Victoria Supervisor s Title IT Audit Director Travel Required Yes FOR OAG HR USE ONLY: Approved Classification or Leadership
More informationPARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals
PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and
More informationPARALEGAL CERTIFICATIONS. National Professional Standard for Paralegals
PARALEGAL CERTIFICATIONS National Professional Standard for Paralegals 1 OUR MISSION NALA leads the paralegal profession by providing a voluntary certification program, continuing legal education, and
More informationImmersion Academy Annual Report 2017
Immersion Academy Annual Report 2017 Accelerated, intensive training and certification program that develops the real-world knowledge and hands-on skills needed to defend today s information security systems.
More informationEffective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below.
Effective October 1, 2017 the Total Hourly Rates for the NYSTEC contract can be found below. NYSTEC Labor Category Not to Exceed Rates exclusive of travel for NYSTEC FY 2017 Not to Exceed Rates exclusive
More informationCollege of Information Technology
College of Information Technology Undergraduate Transfer Evaluation Guidelines Bachelor of Science in Computer Science A transcript evaluation is completed once official transcripts from all previously
More informationPlenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m.
Plenary Session: Branch Cybersecurity Controls Thursday, February 22 1:15 p.m. 2:15 p.m. Cybersecurity is a top priority for the financial services industry. Firms dedicate significant resources every
More information