Permanent Management Information System Job Vacancies

151 to 175 of 2,813 Permanent Management Information System Jobs

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-060 with Security Clearance

Dayton, Ohio, United States
IC-CAP
Information System Security Manager (ISSM) 2's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-133 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
Information System Security Manager (ISSM) 1's primary function serves as a principal advisor on all matters, technical and otherwise, involving the security of information systems under their purview. Primary support will be working within Special Access Programs (SAPs) supporting Department of Defense (DoD) agencies, such as HQ Air Force, Office of the Secretary of … for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. Performance shall include : Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security … and other cyber security personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure approved procedures are in place for clearing, sanitizing, and destroying various types of hardware and media Develop and execute security assessment plans that include verification that More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Systems Engineer with Security Clearance

Annapolis Junction, Maryland, United States
FUSE Engineering
Mission User Group meetings, works closely UX engineers, reviews requirements and wireframes for implementation. Manages agile process. Requires good communication skills, leadership experience. Knowledgeable in user interface design methodologies. System Engineering responsible for engineering the TMOD ITOS architecture implementing all requirements identified through requirements management, ensuring traceability of requirements through system design, developing, testing, verification, and … validation Analyzes user's requirements, concept of operations documents, and high level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems … into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Ultimate responsibility for More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Assurance Systems Engineer with Security Clearance

Laurel, Maryland, United States
Hybrid / WFH Options
TEKsystems c/o Allegis Group
Global Solutions Management - Operations II (GSM-O II) contract at DISA. This contract includes the Operations, Sustainment, Maintenance, Repair, and Defense of the Defense Information System Network (DISN) within the DOD Information Network (DODIN) in support of the Defense Information Systems Agency (DISA). It also includes support to other key … clearance and Security + are required upon start. Primary Responsibilities: • Excellent written and verbal communication skills a must. • Interact with members of the technical team to understand the current system, subsystems, and component specifications. • Responsible for understanding entire projects or processes spanning multiple technical areas. • Support risk assessment, risk management, security control assessment, continuous monitoring, service design … program support functions. • Support and assist in documentation production using various software tools and applying consistent formatting and style throughout documentation. • Participate in the development, facilitation, and coordination of system documentation such as: System Engineering Plans; Initial Capabilities Documents; Requirements Specifications; and Interface Control Documentation; Assessment and authorization documentation (Body of Evidence) for management and continuous More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead Security Compliance Manager

Manchester, Lancashire, United Kingdom
Hybrid / WFH Options
TalkTalk Telecom Group PLC
experts in their field who embody our values every day: we care; we challenge; we commit. About the Role You will be part of an efficacious Security Risk Management and Governance team that exists in a strong and mature Security function within PXC's Technology and Security Business Unit. … Reporting directly into the Head of Security Risk Management and Governance, you will be responsible for management of Information Security Management System and maintain compliance with the respective security standards. Key Responsibilities Working cross-functionally, this role is pivotal to the successful management and maintenance of PXC's several … facilitate our response to our external auditors. Responsibilities will include: Maintain and continually improve PXC's external compliance, including mergers & acquisition's, Information Security Management System (ISMS) and compliance regime for security certifications (TSA, ISO27001, PCI, Cyber Essentials, External Audit IT General Controls). Oversee and manage the process for responding to incoming customer security More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

System Administrator 2 (MM) with Security Clearance

Annapolis Junction, Maryland, United States
FUSE Engineering
Description Provides support for implementation, troubleshooting and maintenance of information Technology (IT) systems. Manages IT system infrastructure and any processes related to these systems. Provides support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server/storage/network devices, mobile devices, etc. Provides Tier 1 (Help … problem identification, diagnosis and resolution of problems. Provides support for the escalation and communication of status to agency management and internal customers. Provides support for the dispatch system and hardware problems and remains involved in the resolution process. Configures and manages UNIX, Linux and Windows operating systems and installs/loads operating system software, troubleshoots, maintains … and resolution of problems Perform account management, e.g. establishing, activating, modifying, disabling, and removing accounts. Provide configuration management, implementation, and sustainment of compliance with applicable system security controls. Perform periodic vulnerability scans of systems Provide support to IT systems including day-to-day operations, monitoring and problem resolution for all of the client/server More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Sr. Acquisition Program Management Specialist with Security Clearance

Fort Belvoir, Virginia, United States
Culmen International, LLC
About the Role: Hot Job - Immediate Opening! The Senior Acquisition Program Management Specialist will work closely with government Assistant Program Managers (APMs) in support of specific programs and support large Acquisition Category (ACAT) Level III projects which include regimented, acquisition-specific actions requiring command-level oversight. What You'll Do in Your New Role: Develop program support documentation … e.g., Simple Acquisition Management Plans (SAMPs), Acquisition Program Baselines (APBs), Analyses of Alternatives (AoAs), etc.) in order to support the acquisition strategy/plan, acquiring appropriate approvals specified by the APMs, Program Executive Officer (PEO) and the Acquisition Executive. Assist Government personnel in facilitating procurement and acquisition planning sessions with user departments' representatives to ensure understanding of the … and associated timeframes, and establishing respective roles and responsibilities. Advise Government personnel in the preparation of new requirements documentation. In addition, assist Government personnel in preparing new equipment and system SOOs and SOWs to satisfy validated unit requirements. Track the status of procurement actions. Prepare and submit logistics data to the receiving supply support activity. Perform market research to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

GEOINT Standards Data Modeler - Expert/Lead with Security Clearance

Springfield, Virginia, United States
Compass Inc
logical models in order to understand data requirements. Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS). Desired: Able to develop, describe & apply complex concepts & processes. Perform multiple tasks at specialist level in a leadership role. Lead and manage multiple Junior/Mid-level … Framework (RDF) and Web Ontology Language (OWL). Have familiarity with the major varieties of JSON (JSON-LD, GeoJSON, JSON-B, etc.). Have familiarity with Simple Knowledge Organization System (SKOS) UML (class diagrams): OCL A plus GML, XML or XSD JSON, JSON-Schema or similar (JSON-LD, GeoJSON) OWL, SKOS, and/or RDF Experienced using data and … system modeling tools such as Sparx Enterprise Architect MySQL MS Access Microsoft Visual Basic (VBA) programming SQL Logical data modeling and/or data architecture experience; experience with ontologies, taxonomies, vocabularies, thesauri a plus Java experience is a plus but not required. Attention to detail & organized. Eager to learn new technologies and skills. Good verbal and written communication Familiar More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Systems Security Engineer with Security Clearance

Herndon, Virginia, United States
RSCY Consultants, LLC
Currently seeking an Information Systems Security Engineers (ISSE) to support an Intel Community (IC) customer in the Herndon, Virginia area. ISSE responsibilities for conducting information system security engineering activities for new or existing system(s) may include: Defines information security requirements and their integration into information systems and its technology … assessments to verify compliance with required configuration guidance and support A&A testing and validation of security designs. Conducting risk analysis reviewing ACAS, CVEs, plugins, CWEs, research, collaborating with System Administrators to mitigate identified vulnerabilities and/or author Plans of Actions and Milestones (POA&M) as needed. Execution of continuous monitoring efforts responds to data calls, scan requests … technical input. Support government activities and report to appropriate IC and DoD authorities (i.e., USCYBERCOM, IC-SCC) Support security authorization activities in compliance with the customer Information System Certification and Accreditation Process following the NIST Risk Management Framework (RMF), CNSSI No 1243 and other prescribed business processes for security engineering. Assist architects and systems developers More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Junior Information Security Officer

London, United Kingdom
Hybrid / WFH Options
Steamship Mutual
Purpose : The Junior Information Security Officer (JISO) will assist the Information Security team in implementing and maintaining the information security management system with the objective of managing risks to information assets to an acceptable level. The JISO will develop a good understanding of the information security policies … is imperative that the JISO develops a strong understanding of the organisation's technology landscape to help identify potential threats and vulnerabilities. Key Responsibilities: Assist in maintaining the information security standards, procedures and guidelines. Participate in the information security risk management process to identify, assess, treat and monitor risks. Manage information security … incidents and events to protect information assets. Help develop and implement incident response plans and procedures to ensure that information services are recovered in a timely manner in the event of a security breach. Track vendor and media disclosure of threats and vulnerabilities and advise on the appropriate courses of action. Audit security controls and report More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior Splunk Engineer (Warrenton, Virginia) with Security Clearance

Warrenton, Virginia, United States
Amentum
Are you interested in using your skills to help shape the Cyber, Security, & Intel space? If so, look no further. Amentum is seeking a Senior Information System Security Engineer to join our team of passionate individuals in Warrenton, VA. In this role you will support challenging, mission-critical projects that make a direct impact on the Nation … provide imaginative solutions that enable the adoption of innovation and emerging technologies that create opportunities for transformative change. Responsibilities: The duties and responsibilities of the Senior Information System Security Engineer (ISSE) include, but are not limited to, the following: Experience creating custom dashboards, writing queries, building, and generating reports, and setting up alerts and notifications using all … future products/systems thus ensuring these systems can be accredited based on compliance with the Joint Special Access Program Implementation Guide (JSIG). Recommend the components to implement system security requirements using intimate knowledge of security design best practices for information systems. throughout the system development life cycle to support the generation of the security More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information Technology Architect II-IM Application Development TX

Irving, Texas, United States
CHRISTUS Health
Description Summary: The IT Architect II is responsible for design of IT systems including system infrastructure, system security, application architecture, software and data life cycle management. Provides enterprise architectural framework for the design, development, and deployment of information/business systems. Proactively drives the prioritization of key technology enablers for achieving enterprise level system objectives … solutions that exceed expectations. This role requires excellent collaboration and communication skills to translate complex requirements into functional architecture. Responsibilities: • Assists in the development of the information system vision and strategy of the organization; assists in the development, implementation, communication, and promotion of strategic and tactical plans • Researches and participates in beta testing of new systems and … technologies in order to better evaluate their suitability to the CHRISTUS environment • Evaluates proposed system acquisitions and provides critical input to the decision-making process relative to compatibility, cost, resource requirements, operations, and maintenance; develops plans and recommendations to improve the performance and efficiency of assigned systems; addresses all aspects of assigned systems, including hardware, software, outside services, etc. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Systems Engineer III with Security Clearance

Georgia, United States
CACI
ll interact with the Government regarding Systems Engineering technical considerations and for associated problems, issues or conflicts. Responsibilities: Analyzes user's requirements, concept of operations documents, and high-level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. … Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Ultimate responsibility … Fourteen (14) years' experience as a systems engineering in programs and contracts of similar scope, type and complexity is required for a Systems Engineer II. Bachelor's degree in system engineering, Computer Science, Information Systems, Engineering Science, Engineering Management, or related discipline from an accredited college or university is preferred. Five (5) years of additional More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Contract Administrator Im-Im Financial Services

Irving, Texas, United States
Christus Health
Description Summary: Manages controls and coordinates contract process standardization across the organization for IM. Responsible for establishing system standards with regards to contract database management in accordance with legal, accounting and risk requirements. Manages system wide contract database and responsible for user administration functions across the enterprise. Leads and manages the contract administrator resource group with … request for proposals (RFPs) for Information Management Department. Coordinates with purchasing department to insure adherence to GPO (group purchasing organization) requirements as appropriate. Responsibilities: • Provide system leadership for contracts administration processes, compliance and database functions. • Establish and maintain system standards for contract processing • Maintain centralized contract database • Perform user administration functions. • Develop and leads … system level resource group to align practices among business unit contract administrators. • Organize, maintain and electronically track all contracts and related documents within the Information Management department. Assists and trains business units in standard contract processes and procedures. • Audit of business unit contract processes to assure compliance with system standards. • Assist in contract development More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Engineer - Mid / Senior Level - CLEA with Security Clearance

Annapolis Junction, Maryland, United States
Constellation Technologies Inc
Information Assurance, Nessus, RMF, Windows, Linux, WireShark, System Security Plans, Authorization to Operate, Verification and Validation, NIST, PKI, Scripting Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active … last five (05) years). At least fourteen (14) years of direct/relevant experience Bachelor's degree in Computer Science, Information Assurance, Information Security, System Engineering or related discipline from an accredited college or university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a … bachelor's degree. Certified Information System Security Professional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. Must have experience applying Risk Management Framework. Must have experience formulating and assessing IT security policy. More ❯
Employment Type: Permanent
Salary: USD 250,000 Annual
Posted:

SOC Analyst

Stevenage, Hertfordshire, England, United Kingdom
MBDA
An exciting opportunity for a passionate SOC Analyst to join a unique, multi-national Information Management function. Ideal candidates should be committed to protecting our critical systems and ensuring the integrity and security of our network infrastructure. Salary : Circa £60,000 depending on experience plus Shift Premium Location: Stevenage, On Prem Shift pattern: consisting of days … treatments Facilities : Fantastic site facilities including subsidised meals, free car parking and much more... The opportunity: An opportunity has arisen in the cyber security operations centre (SOC) within Information Management (IM) for a SOC Threat Detection Analyst. Supporting the Senior SOC analysts in assisting IM meet the challenges and demands of countering the Cyber Threat. The … a proactive ethos in an ever-changing cyber security environment and provide robust threat detection and analysis within the 24x7 SOC. To support the SOC Manager in assisting Information Management UK meet the challenges and demands of countering the Cyber Threat. Support for the operational functions of the UK SOC. To work with other UK SOC More ❯
Employment Type: Full-Time
Salary: £60,000 per annum
Posted:

ISSO with Security Clearance

Springfield, Virginia, United States
AscendN Federal
the ISSM in support of various information assurance programs such as security authorization activities in compliance with Risk Management Framework (RMF) policies and procedures including System Security Plans (SSPs), Risk Assessment Reports, A&A packages, and Security Controls Traceability Matrix (SCTM) Maintains operational security posture to ensure information systems (IS), security policies, standards … and procedures are established and followed Performs vulnerability/risk assessment analysis to support Assessment & Authorization (A&A) Review and analyze system audit logs to identify anomalous activity and potential threats to network resources Conducting vulnerability scans and recognizing vulnerabilities in security systems Ensure that cybersecurity-enabled products or other compensating security control technologies reduce identified risk to acceptable … identify security gaps in security architecture resulting in recommendations for inclusion in the risk Work with government customers to support computer security incidents and vulnerability compliance Input and maintain system documentation into government record-keeping systems Xacta Provide Configuration Management for security-relevant information system software, hardware, and firmware; Perform risk analysis whenever an More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Software Engineer 2 with Security Clearance

Hanover, Maryland, United States
Amentum
challenging, mission-critical projects that make a direct impact on the Nation's security and intelligence mission. Responsibilities: Analyzes user's requirements, concept of operations documents, and high-level system architectures to develop system requirements specifications. Analyzes system requirements and leads design and development activities. Guides users in formulating requirements, advises alternative approaches, and conducts feasibility studies. … Provides technical leadership for the integration of requirements, design, and technology. Incorporates new plans, designs and systems into ongoing operations. Develops technical documentation. Develops system Architecture and system design documentation. Guides system development and implementation planning through assessment or preparation of system engineering management plans and system integration and test plans. Interacts with … with the Systems Engineering area of responsibility. Communicates with other program personnel, government overseers, and senior executives. Contribute to the development of sections of systems engineering documentation such as System Engineering Plans, Initial Capabilities Documents, Requirements specifications, and Interface Control Documents Manage system requirements and derived requirements to ensure the delivery of production systems that are compatible with More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Physical Security Engineer 4 - Chantilly, VA with Security Clearance

Chantilly, Virginia, United States
M.C. Dean
with more than 5,800 professionals who engineer and deploy automated, secure and resilient power and technology systems; and deliver the management platforms essential for long-term system sustainability. Together, we transform the way complex, large-scale systems are designed, delivered, and sustained-enhancing client outcomes, improving lives, and changing the world for the better. We are … seamless integration, and continued performance of these systems across multiple project sites. You will be responsible for analyzing user requirements, reviewing concept of operations documents, and assessing high-level system architectures to develop detailed system requirements specifications and designs. The role also involves incorporating new plans, designs, and technologies into ongoing operations, ensuring their alignment with current system … Access Control and Intrusion Detection drawing packages Design reviews for new building installation and renovation work to Access Control, Intrusion Detection and VMS devices. Assists with the development of system requirements, functional requirements, and allocation of the same to individual hardware, software, facility, and personnel components Participates in an Integrated Product Team to design new capabilities based upon evaluation More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Business Finance Professional with Security Clearance

Annapolis Junction, Maryland, United States
BCT LLC
Management Offices with conducting End of the Year activities and the completion of the Actual data calls. Enter requisitions in the customer's financial management system that include all necessary information and documentation (PSC#, PAR, SPAT, BER#, Acq Sec# etc.). Use customer financial management systems to prepare non-complex Military … associated requisitions. Process incoming MIPRs and EAOs using standard BM&A process to ensure Agency acceptance. Create and maintain spend plans in the Agency's financial management system to document Government-specified requirements. Modify requisitions and associated documentation to comply with Contracting's guidance to assist in the obligation of funds. Assist Government Program Managers (GPMs) in … creation of budget or financial planning for an organization, organizational unit, program, or expenditure/cost center to identify potential variances. In the customer's financial management system, prepare complex Military Interdepartmental Purchase Requests (MIPR) and Economy Act Orders (EAO) and their associated requisitions. Provide assistance in analyzing and developing improved policies, plans, methods, procedures, and systems More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

SENIOR INFORMATION SYSTEM SECURITY MANAGER - VIRGINIA - URGENT with Security Clearance

Arlington, Virginia, United States
Cyberstrike Group
Job Number: 59 Job Category: GovTech Job Title: SENIOR INFORMATION SYSTEM SECURITY MANAGER - VIRGINIA - URGENT Job Type: Full-time Clearance Level: Top secret/SCI Work Arrangement: Remote Job Location: Arlington VA Salary: 250k - 300k Background Utilize expert knowledge and experience regarding risk management strategies in support of a major DoD program Collaborate between the … assessments and identify potential vulnerabilities and threats to information systems Develop and implement risk mitigation strategies and controls to minimize the impact of security incidents Collaborate with system administrators, network administrators, and other stakeholders to plan and implement security measures for information systems. This includes establishing security controls and standards for information systems … including Continuous monitoring Develop and implement incident response procedures to reconstitute system operations to address security incidents and breaches Ensure compliance with relevant security standards, regulations, and frameworks Conduct periodic security audits and assessments to evaluate the effectiveness of security controls and identify areas for improvement Maintain accurate and up-to-date security documentation, including security plans, risk assessments More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Information System Security Officer with Security Clearance

Tustin, California, United States
L'Garde, Inc
Information System Security Officer (ISSO) L Garde is a full-service design, development, manufacturing, and qual-test supplier to Tier 1 primes and government agencies. We provide systems engineering and skilled technicians to make your Skunk Works-type project a reality. With over 50 years of aerospace and defense expertise, our deployable systems test the limits of … what's possible in the harshest of environments - in space, on the moon, and even on other planets. We are seeking a diligent and resourceful Information System Security Officer (ISSO) to join our team. If you are a proactive cybersecurity professional with a passion for protecting critical systems and making an impact in national security, this role … a success. Key Responsibilities: Cybersecurity & Compliance •Support implementation, monitoring, and continuous improvement of cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetration testing, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. More ❯
Employment Type: Permanent
Salary: USD 114,400 Annual
Posted:

Financial Information Resource Management Specialist - 12 Month Fixed Term Contract

London, United Kingdom
Hybrid / WFH Options
Hogan Lovells
Financial Information Resource Management Specialist - 12 Month Fixed Term Contract page is loaded Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Apply locations London time type Full time posted on Posted Yesterday job requisition id R257925 Keen to become part of a truly global, collaborative team of professionals? Your journey … begins here. Job Title Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Department Finance Office Location London Reports To Manager, Financial Information Resource Management Working Hours 35 hours per week, 9:30am to 5:30pm but additional hours may be required. We are happy to consider agile and flexible working … and special agreed billing rate arrangements. This is an extremely busy office, carrying out a wide variety of tasks and ensuring that the credibility of the data in the system is of the highest standard. Role Overview This role will review, analyse and report on client maintenance data as needed. The position will focus on the team applying quality More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Information Systems Security Engineer 2 with Security Clearance

Fort George G Meade, Maryland, United States
The Birchmere Group, LLC
perform, or review, technical security assessments of computing environments to identify points of vulnerability, non-compliance with established Cybersecurity standards and regulations, and recommend mitigation strategies. Validate and verifies system security requirements definitions and analysis and establishes system security designs. Design, develop, implement and/or integrate Cybersecurity and security systems and system components including those for … of Agency security policy and enterprise solutions. Support the building of security architectures. Enforce the design and implementation of trusted relations among external systems and architectures. Assess and mitigate system security threats/risks throughout the system development life cycle. Contribute to the security planning, assessment, risk analysis, risk management, certification and awareness activities for system … Review certification and accreditation (C&A) documentation, provide feedback on completeness and compliance of its content. Support security authorization activities in compliance with NSA/CSS Information System Certification and Accreditation Process (NISCAP) and DoD Risk Management Framework (RMF), the NIST Risk Management Framework (RMF) process, and prescribed NSA/CSS business processes More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Management Information System
10th Percentile
£28,700
25th Percentile
£36,650
Median
£51,645
75th Percentile
£70,603
90th Percentile
£85,000