Risk Management Job Vacancies

376 to 400 of 1,691 Risk Management Jobs

Global Platform Team Lead and Senior Director - IT Security

London, United Kingdom
Boston Consulting Group
blend digital and human capabilities. Our diverse, global teams bring deep industry and functional expertise and a range of perspectives to spark change. BCG delivers solutions through leading-edge management consulting along with technology and design, corporate and digital ventures-and business purpose. We work in a uniquely collaborative model across the firm and throughout all levels of the … requirements, and user experience expectations. Champion DevSecOps practices to embed security early into development and delivery workflows. Security Platform Engineering: Lead end-to-end engineering for identity and access management (IAM), including authentication, authorization, and privileged access controls. Oversee endpoint security architecture and enforcement, ensuring comprehensive coverage for threat detection, malware prevention, and device compliance. Build and operate scalable … data protection solutions, including data loss prevention (DLP), secrets management, encryption, and classification. Integrate security controls into CI/CD pipelines, cloud-native services, and on-prem platforms to enforce security-by-design principles. Deliver security capabilities that support modern work scenarios, remote access, zero-trust networking, and AI/ML workloads. Leverage automation frameworks and IaC to improve More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Program Manager with Security Clearance

Washington, Washington DC, United States
SiloSmashers
SiloSmashers, Inc. is a strategy, technology, and management consulting firm, founded in 1992, and located in Reston, Virginia. SiloSmashers delivers superior services and solutions to the public sector in the areas of project/program management, performance management, and IT security. The company provides innovative, collaborative business approaches, and proven methodologies that enable customers to break down … The Program Manager serves as the single point of contact for the contracting officer and the contracting officer's representative. The ideal candidate has experience managing a security program management office (PMO), positively affecting change and improving operations in a federal cybersecurity environment. The position entails managing a team of up to 50 individuals. General Responsibilities Collect requirements from … customer on production and delivery of documentation providing operational guidance and processes around cybersecurity capability services, cybersecurity management, and other topics as needed. Translate technical cybersecurity capability requirements into stakeholder needs and solutions statements. Manages overall contract financials. Maintains a budget and seeks efficiencies to save costs. Produces financial reports as required by the contract and by management. Primary More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-025 with Security Clearance

Hampton, Virginia, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-085 with Security Clearance

Arlington, Virginia, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-022 with Security Clearance

Bedford, Massachusetts, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 2 102-060 with Security Clearance

Dayton, Ohio, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

ISSM 1 102-133 with Security Clearance

Colorado Springs, Colorado, United States
IC-CAP
program policy; special emphasis placed upon integration of existing SAP network infrastructures Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process Advise customer on Risk Management Framework (RMF) assessment and authorization issues … Perform risk assessments and make recommendations to DoD agency customers Advise government program managers on security testing methodologies and processes Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cyber security personnel receive the necessary technical and security training … security official on approval of external information systems (e.g., guest systems, interconnected system with another organization) Conduct periodic assessments of the security posture of the authorization boundaries Ensure configuration management (CM) for security-relevant changes to software, hardware, and firmware and that they are properly documented Ensure periodic testing is conducted to evaluate the security posture of IS by More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Senior Product Manager, Security

United Kingdom
Hybrid / WFH Options
P2P
to achieve its mission of being the most trusted crypto platform. You will play a crucial role in tackling the most challenging problems in crypto custody and security: secrets management, risk management, insider threat, account take over, regulatory compliance, and more. You will work closely with cross-functional teams, including Engineering, Security, Compliance, and Operations, to deliver … to guide product development Align teams on a shared vision and steer execution on that vision What we look for in you (ie. job requirements): 6+ years of product management experience Exceptional interpersonal communication, relationship management and organizational skills Deep analytical, prioritization and problem solving skills Demonstrated ability in working with a high degree of technical complexity across … a broad product portfolio Previous experience working in software product management in platform products Demonstrated passion for cryptocurrency, financial markets, and the Coinbase mission An entrepreneurial mindset with the ability to succeed in a fast-paced environment Aptitude for learning and ability to quickly ramp up in complicated domains Nice to haves: Previous experience with security, privacy and compliance More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Cybersecurity Course Instructor with Security Clearance

Hanover, Maryland, United States
Eccalon LLC
growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethical hacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including syllabi, lecture notes, practical … lab activities, assignments, and exams to ensure content reflects current industry trends, best practices, and emerging threats. Upload curriculum into the Eccalon Learning Management System. Hands-on Lab Exercises: Build labs as well as create, implement, and manage cybersecurity lab tools like UAS, AUV, and additive manufacturing control systems, etc., to provide students with real-world scenarios and hands … content aligns with industry-recognized certifications, such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized networks, attack and defense simulations, and monitoring student use of the systems. Troubleshooting: Assist students in troubleshooting technical More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

AI Security Consultant

London, South East, England, United Kingdom
Marshall Wolfe
Security Consultant - Artificial Intelligence (AI) Our client, a global insurance organisation, is looking to recruit the services of an experienced Senior Risk Analyst with deep expertise in Artificial Intelligence (AI), Machine Learning (ML), and Large Language Models (LLMs) to join our client's Security Risk Management team. This role plays a pivotal part in assessing and managing … risks related to AI-driven projects across a global enterprise, ensuring new technologies are adopted safely and responsibly. Key Responsibilities Conduct enhanced risk assessments of AI/ML-based initiatives and proof-of-concepts. Evaluate AI systems for potential misuse, abuse, or adversarial threats. Collaborate with stakeholders across IT, Data Privacy, Innovation, and Business to identify and mitigate risks. … Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience 10+ years of professional experience, including demonstrable AI/ML expertise. Hands-on knowledge More ❯
Employment Type: Contractor
Rate: £400 - £480 per day
Posted:

Zero Trust Architecture Engineer (Contingent) with Security Clearance

Washington, Washington DC, United States
Proksi Systems
For a contingent federal contractor position with MS GCC-H/GCC background. Position Description • Provide architecture and engineering support for Zero Trust implementation initiatives. • Develop Task Order Management Plans, cost analyses, project tracking schedules, risk registers, and mitigation strategies aligned with SOC operations. • Conduct assessment planning across Identity, Devices, Network Segmentation, Application Workloads, and Data Protection, adhering … implementation plans across Identity, Device, Application & Workload, Data, Network & Environment, Automation & Orchestration, and Analytics pillars. • Author and maintain ZTA System Development Life Cycle (SDLC) artifacts and Cyber Supply Chain Risk Management (C SCRM) documentation consistent with NIST SP . • Collaborate with SOC, SIEM, and engineering teams to ensure coherent Zero Trust integration enterprise wide. Minimum Qualifications • Bachelor's … Government Community Cloud High (GCC H/GCC) environments. • Demonstrated experience designing and implementing Zero Trust architecture frameworks. • Working knowledge of NIST SP and federal cybersecurity programs. • Strong planning, risk management, and stakeholder coordination skills. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Cyber Security Operational Technology (OT) Specialist

Immingham, Lincolnshire, North East, United Kingdom
Rullion Limited
enhancements across OT networks, ideally within the energy sector. The role will report into the Chief Information Security Officer (CISO) and will play a key role within an OT risk management framework which covers multiple generation and storage sites. The role can be based from Immingham or London offices. Regular travel to sites will be required. The Role … impact across multiple UK energy generation and storage sites? We're looking for a Cyber Security OT Specialist with strong first-line technical skills and a solid grounding in risk management frameworks, ideally with experience in the energy sector. This is a key role within our cyber risk function, supporting our sites' critical infrastructure and helping shape … environments aligned with IEC62443 standards. Key Responsibilities Lead the implementation of new technical security controls across OT environments. Contribute to the assessment of OT network architecture , protocols, and change management processes. Lead incident response and remediation for cyber events detected by our OT SIEM systems. Actively support vulnerability management and ensure threat exposure is minimised. Provide hands-on More ❯
Employment Type: Permanent
Salary: £60,000
Posted:

AWS Python Developer

Wayne, Pennsylvania, United States
Robotics technology LLC
We are seeking a talented AWS/Python Developer to join our Risk and Investment Technology team at a leading financial services firm. This position offers an exciting opportunity to contribute to cutting-edge cloud-native solutions for Market and Enterprise Risk Management within Lincoln's prestigious risk management program. The ideal candidate will be More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Major Incident & Problem Manager

Swansea Vale, Swansea, West Glamorgan, Wales, United Kingdom
Hybrid / WFH Options
ERS
Major Incident & Problem Manager Grade: 4 Reporting to: Head of IT Service Management Location: Swansea About us IQUW is a speciality (re)insurer at Lloyd’s (Syndicate 1856) underwriting a diverse range of Property, Commercial and Speciality (re)insurance products from Cargo and Marine to Political Violence, Terror and War. We combine data, intelligent automation and human expertise to … to meet their customer’s needs. The role We are seeking a proactive and experienced Incident and Problem Manager to take ownership of our Incident, Major Incident and Problem Management processes. This role is critical in reducing operational disruption, improving service reliability, and driving continuous improvement across IT services. The ideal candidate will have a strong process ownership and … communication mindset, ensuring that incidents are managed effectively while also implementing problem management strategies to prevent recurrence. We currently operate a hybrid working model. This entails 3 days per week collaborating with colleagues in the office, and 2 days working from home. Key responsibilities Major Incident Management Own and manage the end-to-end Major Incident process, ensuring More ❯
Employment Type: Full-Time
Salary: Salary negotiable
Posted:

Business Product Analyst

London Area, United Kingdom
Arthur Recruitment
Act as a key member of the Product Management team, supporting the delivery and improvement of business platforms and processes across Operations and core insurance functions (Underwriting, Claims, Reinsurance, Finance, Compliance, and Exposure Management). You will work closely with Business Product Managers and stakeholders to analyse workflows, investigate issues, and help deliver solutions that improve efficiency, strengthen … risk management, and adapt to regulatory or operational changes. Key Responsibilities Support Business Product Managers in managing business platforms and processes, ensuring they align with operational needs and regulatory requirements. Investigate and document operational issues, helping to identify root causes and propose practical solutions or automation opportunities. Assist with the maintenance and prioritisation of product backlogs, ensuring items … assessing potential impacts and escalating to Business Product Managers as required. Build strong working relationships with stakeholders across the business (Operations, IT, Compliance, Underwriting, Finance, Claims, Actuarial, Reinsurance, Exposure Management). Support the production of business cases and reporting to guide prioritisation of Application, Data, and BI initiatives. Help maintain and evolve documentation, process maps, and operating procedures in More ❯
Posted:

Business Product Analyst

City of London, London, United Kingdom
Arthur Recruitment
Act as a key member of the Product Management team, supporting the delivery and improvement of business platforms and processes across Operations and core insurance functions (Underwriting, Claims, Reinsurance, Finance, Compliance, and Exposure Management). You will work closely with Business Product Managers and stakeholders to analyse workflows, investigate issues, and help deliver solutions that improve efficiency, strengthen … risk management, and adapt to regulatory or operational changes. Key Responsibilities Support Business Product Managers in managing business platforms and processes, ensuring they align with operational needs and regulatory requirements. Investigate and document operational issues, helping to identify root causes and propose practical solutions or automation opportunities. Assist with the maintenance and prioritisation of product backlogs, ensuring items … assessing potential impacts and escalating to Business Product Managers as required. Build strong working relationships with stakeholders across the business (Operations, IT, Compliance, Underwriting, Finance, Claims, Actuarial, Reinsurance, Exposure Management). Support the production of business cases and reporting to guide prioritisation of Application, Data, and BI initiatives. Help maintain and evolve documentation, process maps, and operating procedures in More ❯
Posted:

Business Product Analyst

london, south east england, united kingdom
Arthur Recruitment
Act as a key member of the Product Management team, supporting the delivery and improvement of business platforms and processes across Operations and core insurance functions (Underwriting, Claims, Reinsurance, Finance, Compliance, and Exposure Management). You will work closely with Business Product Managers and stakeholders to analyse workflows, investigate issues, and help deliver solutions that improve efficiency, strengthen … risk management, and adapt to regulatory or operational changes. Key Responsibilities Support Business Product Managers in managing business platforms and processes, ensuring they align with operational needs and regulatory requirements. Investigate and document operational issues, helping to identify root causes and propose practical solutions or automation opportunities. Assist with the maintenance and prioritisation of product backlogs, ensuring items … assessing potential impacts and escalating to Business Product Managers as required. Build strong working relationships with stakeholders across the business (Operations, IT, Compliance, Underwriting, Finance, Claims, Actuarial, Reinsurance, Exposure Management). Support the production of business cases and reporting to guide prioritisation of Application, Data, and BI initiatives. Help maintain and evolve documentation, process maps, and operating procedures in More ❯
Posted:

Business Product Analyst

london (city of london), south east england, united kingdom
Arthur Recruitment
Act as a key member of the Product Management team, supporting the delivery and improvement of business platforms and processes across Operations and core insurance functions (Underwriting, Claims, Reinsurance, Finance, Compliance, and Exposure Management). You will work closely with Business Product Managers and stakeholders to analyse workflows, investigate issues, and help deliver solutions that improve efficiency, strengthen … risk management, and adapt to regulatory or operational changes. Key Responsibilities Support Business Product Managers in managing business platforms and processes, ensuring they align with operational needs and regulatory requirements. Investigate and document operational issues, helping to identify root causes and propose practical solutions or automation opportunities. Assist with the maintenance and prioritisation of product backlogs, ensuring items … assessing potential impacts and escalating to Business Product Managers as required. Build strong working relationships with stakeholders across the business (Operations, IT, Compliance, Underwriting, Finance, Claims, Actuarial, Reinsurance, Exposure Management). Support the production of business cases and reporting to guide prioritisation of Application, Data, and BI initiatives. Help maintain and evolve documentation, process maps, and operating procedures in More ❯
Posted:

Business Product Analyst

slough, south east england, united kingdom
Arthur Recruitment
Act as a key member of the Product Management team, supporting the delivery and improvement of business platforms and processes across Operations and core insurance functions (Underwriting, Claims, Reinsurance, Finance, Compliance, and Exposure Management). You will work closely with Business Product Managers and stakeholders to analyse workflows, investigate issues, and help deliver solutions that improve efficiency, strengthen … risk management, and adapt to regulatory or operational changes. Key Responsibilities Support Business Product Managers in managing business platforms and processes, ensuring they align with operational needs and regulatory requirements. Investigate and document operational issues, helping to identify root causes and propose practical solutions or automation opportunities. Assist with the maintenance and prioritisation of product backlogs, ensuring items … assessing potential impacts and escalating to Business Product Managers as required. Build strong working relationships with stakeholders across the business (Operations, IT, Compliance, Underwriting, Finance, Claims, Actuarial, Reinsurance, Exposure Management). Support the production of business cases and reporting to guide prioritisation of Application, Data, and BI initiatives. Help maintain and evolve documentation, process maps, and operating procedures in More ❯
Posted:

Title : Technical Project Manager

Ashburn, Virginia, United States
Rcube IT LLC
This role includes identifying and managing risks, issues, and change-requests also which are critical factors for delivery success. Skills: Minimum 5-7 years of experience in technical project management or similar experience/expertise Strong understanding of project management methodologies is required Experience of executing projects in Agile methodology using scrum framework Capable of providing gap analysis … business needs Proactively identifying future blockers and gaps and working closely with the team and client to minimize productivity loss Experience of working with JIRA, ADO, or similar project management tools Generating data centric metrics, effective reports, and dashboards Have technical background with understanding and/or hands-on experience in web and/or mobile development technologies like … skills including attention to detail and multitasking Strong leadership, negotiation, analytical, and problem-solving skills Being flexible and able to adjust plans as project requirements change Key Responsibilities: Project Management: Project planning and management including scope, schedule, velocity, efficiency, quality. Create and manage detailed project plans for each milestone and releases Resource Coordination: Resource allocation, ensuring availability and More ❯
Employment Type: Any
Salary: USD Annual
Posted:

Cyber Risk Assessment Analyst

Rogerstone, Gwent, United Kingdom
Hays Technology
Cyber Risk Assessment Analyst Up to 62,000 + bonus South Wales/Hybrid Permanent I'm looking for a cyber risk assessment specialist to identify and assess cyber risks across our client's IT and OT environments. The successful candidate will also be recommending mitigation strategies to strengthen cyber resilience and meet regulatory requirements. The ideal candidate … will possess extensive experience in cyber risk assessment alongside strong experience translating technical risk and control issues into business language. The role requires eligibility for SC clearance and visa sponsorship cannot be offered. What You'll Be Doing: Conducting structured cyber risk assessments across IT and OT systems Gathering technical and business data to inform risk analysis Using tools and frameworks to identify, assess, and prioritise risks Collaborating with stakeholders to assign risk levels and remediation priorities Evaluating the effectiveness of existing security controls Recommending mitigation strategies and validating security measures Maintaining accurate records of assessments and mitigation actions Reporting risk trends and recommendations Managing the risk acceptance process and ensuring proper More ❯
Employment Type: Permanent
Salary: GBP 55,000 - 62,000 Annual
Posted:

Cyber Risk Assessment Analyst

Newport, Gwent, United Kingdom
Hays Technology
Cyber Risk Assessment Analyst Up to £62,000 + bonus South Wales/Hybrid Permanent I'm looking for a cyber risk assessment specialist to identify and assess cyber risks across our client's IT and OT environments. The successful candidate will also be recommending mitigation strategies to strengthen cyber resilience and meet regulatory requirements. The ideal candidate … will possess extensive experience in cyber risk assessment alongside strong experience translating technical risk and control issues into business language. The role requires eligibility for SC clearance and visa sponsorship cannot be offered. What You'll Be Doing: Conducting structured cyber risk assessments across IT and OT systems Gathering technical and business data to inform risk analysis Using tools and frameworks to identify, assess, and prioritise risks Collaborating with stakeholders to assign risk levels and remediation priorities Evaluating the effectiveness of existing security controls Recommending mitigation strategies and validating security measures Maintaining accurate records of assessments and mitigation actions Reporting risk trends and recommendations Managing the risk acceptance process and ensuring proper More ❯
Employment Type: Permanent
Salary: £55000 - £62000/annum plus discretionary bonus
Posted:

Lead Security Engineer with Security Clearance

Fort Belvoir, Virginia, United States
Agensys Corporation
RESPONSIBILITIES Act as an independent and impartial assessor to determine and certify aggregate cybersecurity risk for recommendation to the SCA. Experience in helping federal agencies manage risks associated with operating an on-premise and cloud-based information system while using RMF Conduct security control validation and assessment of technical security features of a system or network to address known … threats and vulnerabilities. The evaluation must consider and identify impacts as well as consideration of existing risk mitigation strategies. Validate and assess security controls in accordance with NIST SP 800-53, CNSSI-1253 and with the DoD Risk Management Framework (RMF) process. Conduct required vulnerability analysis to support mitigation and residual risk determination. Ensure traceability of … in-depth knowledge of all NIST and CNSSI publications related to RMF and security controls for national security systems (NSS) and non-NSS systems. Possess working knowledge of DoD Risk Management Framework (RMF), DoD IA guidance and policies, and NIST 800 series standards. Possess in-depth knowledge and hands-on experience with eMASS software supporting the RMF process. More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Lead Risk Management Analyst

Vienna, Virginia, United States
Hybrid / WFH Options
ALTA IT Services
Job Title: Lead Risk Management Analyst Location: Hybrid Work Model Reporting to Vienna, VA or Pensacola, FL or Winchester, VA Pay Rate: Open to Both C2C and W2 options Position Type: Multiyear Contract Description: Responsible for supporting the operatio More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:

Security Control Assessor with Security Clearance

Saint Louis, Missouri, United States
Life Cycle Engineering
packages (e.g., ISO/IEC 15026- 2). Establish acceptable limits for the software application, network, or system. Review authorization and assurance documents to confirm that the level of risk is within acceptable limits for each software application, system, and network. Manage accreditation packages (e.g., ISO/IEC 15026-2) Required Education, Skills, and Experience: Bachelor's degree in … experience in establishing, implementing, and tracking project plans (more experience required for sr. level openings). Knowledge of computer networking concepts and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and … privacy principles and tools. Knowledge of Security the Risk Management Framework (RMF) and Assessment and Authorization process. Knowledge of information technology (IT) security principles and methods (e.g., firewalls, demilitarized zones, encryption). Skill in discerning the protection needs (i.e., security controls) of information systems and networks. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to More ❯
Employment Type: Permanent
Salary: USD Annual
Posted:
Risk Management
10th Percentile
£46,250
25th Percentile
£57,500
Median
£75,000
75th Percentile
£102,500
90th Percentile
£132,500