46 to 54 of 54
Sort by: Date | Relevance
Compliance Management Oversee the implementation of security controls to ensure compliance with DoD cybersecurity policies, guidelines, and standards. Lead the development and execution of Plans of Actions and Milestones (POAMs) to address identified vulnerabilities and shortcomings. Cybersecurity Tools Expertise in the utilization and management of critical DoD cybersecu
Posted 28 days ago
Analyze technical requirements and identify products and solution sets that meet those requirements. Evaluate existing and new products (hardware, software, and networking) from industry and vendor partners against contract requirements. Participate in vendor meetings/presentations to review product lines and offerings. Evaluate, provide direction to, and evolve the deplo
Posted 28 days ago
Information Assurance Leadership Provide strategic leadership in the development and execution of Information Assurance (IA) strategies, policies, and procedures. Oversee the implementation of security controls, ensuring alignment with DoD directives and guidelines. Plans of Action and Milestones (POAMs) Develop and manage Plans of Action and Milestones (POAMs) to address
Posted 28 days ago
SharePoint Administration Administer and maintain SharePoint environments, including the design and implementation of SharePoint sites, libraries, workflows, and permissions. Implement best practices for SharePoint governance, ensuring proper utilization of features and resources. Security and Compliance Enforce security policies and compliance measures in SharePoint envi
Posted 28 days ago
Define, plan, and execute IT projects as defined in the scope. Write, evaluate, and negotiate various system and software procurements. Provide regular status updates to stakeholders and senior staff. Oversee information system team, to include sys admins, developers, and DBAs. Assist project teams in the implementation of other systems. Work with technical resources to d
Posted 28 days ago
Analyze technical requirements and identify products and solution sets that meet those requirements. Evaluate existing and new products (hardware, software, and networking) from industry and vendor partners against contract requirements. Evaluate, provide direction to, and evolve the deployed identity management solutions and technologies. Lead meetings with vendors to ev
Posted 28 days ago
Load and configure specific software packages such as operating systems, hardware drivers, and custom application software onto desktop, server, PDA, and deployable systems Perform system hardware diagnostics and advises on system problems; troubleshoots and makes repairs to returned maintenance supported equipment. Examples include, but not limited to PDAs, biometric uni
Posted 28 days ago
Assessment and Compliance Assist in the implementation of security controls and measures to ensure compliance with DoD cybersecurity policies and standards. Contribute to the creation and management of Plans of Actions and Milestones (POAMs) to address identified vulnerabilities and weaknesses. DoD Cybersecurity Tools Gain proficiency in the use of essential DoD cybersecu
Posted 28 days ago
A successful candidate will work with others on program security team to provide for all aspects of security to include but not limited to the following Review RMF bodies of evidence such as SSP, SAR, RAR, POA&M, SCTM and RMF artifacts and make recommendations supporting continuous monitoring and continuous assessment stratagies Coordinate with information system POCs for
Posted 1 month ago
Email this Job to Yourself or a Friend
Indicates required fields