Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
Official account of Jobstore.
Job Description and Requirements
Information Security Assurance Administrators strengthen the organization's information security posture through the construction, socialization and performance measurement of policies and procedures based on best practices, adopted frameworks, and risk assessment activities.
Essential Functions and Responsibilities:
Requirements:
Skills and/or Certifications/Licensing
All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
Official account of Jobstore.
Cyber Security Assurance Specialist Preston(Hybrid working) £55-£62k+10% Bonus
My client are Europe's largest Aerospace & Defence organisation.
They are currently looking for an experienced Cyber Security proffesional to join their team based out of their Preston office.
What you will be doing:
* Deliver assurance services to the business, SS EIT, IM&T Sector and Group Functions, covering enterprise systems / services and cloud
* Identification of risk and appropriate mitigations, development & analysis of secure solutions (covering technical / physical / procedural / personnel controls) and assessment of compliance with internal and external standards and regulations
* Deliver documentation to demonstrate compliance to internal and external stakeholders
* Assessment and provision of control effectiveness in managing Cyber security risk
* Provide security architecture / technical input into the development of secure solutions
* Coaching and mentoring junior members of the team
* Support development of strategy and continual service improvement for the Cyber assurance function
* Act as a subject matter expert regarding Cyber assurance activities for the wider organisation
Essential Skills:
* Knowledge of information security standards, such as HMG, NCSC Guidance, ISO 27001/18, NIST 800 etc. HMG is fundamental
* Capable of a very high standard of written communication including experience of writing complex reports and giving formal presentations to senior business peers
* Educated to degree level (or equivalent) preferably in a related discipline (ICT/Computing, Information assurance, risk management, vulnerability/threat assessment) or equivalent, related work experience
* In-depth knowledge of industry standard security policy, standards and good practice guidance and their application to a variety of IT solutions processing protectively marked information
To apply for this role please forward your cv to Peter Bibby on the email address below...
Official account of Jobstore.
Lets Write Africa's Story Together!
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.
Job Description
Minimum Requirements:
Namibian Citizenship;
A Business or Law Diploma/Degree
3 years’ experience in the legal profession and/or company secretarial function;
Company Law and Company Secretarial experience shall be an added advantage;
Flawless command of the English language;
Strong technical, administration and conflict handling skills;
Assertive self-starter with excellent communication and organisation skills; and
Ability to work under pressure while maintaining high service levels.
Job Description:
Ensuring the accuracy, timeous completion, submission, record and safe keeping of records, registers and returns for the Old Mutual Namibia (OMNAM) group of companies;
Performs various administrative company secretarial duties/task for the OMNAM group of companies, inclusive of the compilation and distribution of Board sub-Committee Agenda packs and/or the taking and distribution of minutes;
Manages and responds to company secretarial related queries relating to OMNAM group of companies, inclusive of submissions and returns to regulators and/or other supervisory bodies;
Provide administrative support for the arrangement and organization of Board or Sub[1]Committee meetings, related functions, venue booking, travel arrangements and the like if and when required;
Maintain strict confidentiality of documentation and information; and
Provides general administrative support to the Central Finance as it relates to the company secretarial function.
Skills
Education
Bachelor of Commerce (BCom), Bachelor of Laws (LLB) (Inactive)Closing Date
23 March 2024The Old Mutual Story!
Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Johnson, LA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Riley, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Cavazos, TX. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Stewart, GA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Bliss, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Liberty, NC The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Campbell, KY The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Aberdeen Proving Ground, MD The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$75,200 - 158,100 USDOfficial account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Drum, NY. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
Official account of Jobstore.
Let's Write Africa's Story Together!
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.
Job Description
To support the Head of Governance, Risk and Compliance by embedding and maturing the Information Security and Information Technology capabilities, and posture. The candidate is primarily responsible for defining, creating and monitoring of policies, frameworks, controls and related standards in alignment with legislation, regulatory compliance and to support strategy delivery. The Information Security Officer (ISO) will support enablement and embedding of the Information Security Assessment Centre. They will provide information security risk management and cybersecurity expertise to the business segments. The ISO is expected to work independently to advise and influence technology, and business personnel regarding the safeguarding of information, applications, systems, infrastructure to manage information risks.Governance
Regulatory
Compliance
Leadership
Business Segment Risk Embedment and Oversight
Requirements:
ADDITIONAL QUALIFICATIONS/EXPERIENCE (PREFERRED, NOT A REQUIREMENT)
Skills
Education
Closing Date
30 March 2024The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.
Old Mutual Limited is pro-vaccination and encourages its workforce to be fully vaccinated against Covid-19.
All prospective employees are required to disclose their vaccination status as part of the recruitment process.
Please refer to the Old Mutual’s Covid-19 vaccination policy for further detail. Kindly note that Old Mutual reserves the right to reinstate the requirement to vaccinate at any point if it is of the view that it is imperative to do so.
The Old Mutual Story!
Official account of Jobstore.
Careers in legal can be found in the local and private sector to ensure the company runs smoothly by providing administrative support to solicitors and legal executives. Legal jobs comprise of solicitor, lawyers, corporate attorney, compliance officer, risk manager, judges, paralegal, tax adviser, internal auditor, legal assistant and legal counsel.
The role of legal assistant is to ensure the smooth running of the office and effective case management. Responsibilities include providing administrative support to lawyers, handle communication with clients, administratively attend trials, prepare case briefs, conducting documentary research, develop case relevant information, file basic legal documents, answer phone calls, maintain contact lists and monitor deadlines.
The role of corporate lawyer is to ensure a company’s transactions comply with corporate law and regulations. Responsibilities include preparing the appropriate legal documents for court proceedings, evaluate new business partnerships, cooperate with law firms, represent the company in legal proceedings, oversee the company’s policy on legal matters, protecting the company against legal risks, negotiate deals on behalf of the company and guide management on compliance issues.
The role of lawyers is to represent clients in criminal and civil litigation as well as other legal proceedings. Responsibilities include question witnesses during the course of a trial, interpret laws for individuals, summarise cases to judges/juries, prepare legal briefs, analyse the probable outcomes of cases, examine legal data to determine advisability, cooperate with legal firms, help develop federal and state programs.
The role of legal advisor is to provide legal advice, organise various legal activities, create legal documents and advise the clients on all the relevant legal issues. Responsibilities include conduct legal analysis, involved in drafting different legal submissions, assist in reviewing legal material and draw up formalities regarding the settlement of disputes.
The role of compliance officer is to ensure that the operations and business transactions follow all relevant legal rules. Responsibilities include implementing an effective legal compliance program, createsound internal controls, draft company policies, proactively audit processes, evaluate business activities to assess compliance risk, collaborate with external auditors, educate employees on regulations and industry practices.
The role of company secretary is to undertake a variety of administrative and clerical tasks. Responsibilities include effectively communicating with clients, greet visitors, attend trials, write case briefs, conduct thorough documentary research, verify important case intelligence, preserve an updated case record system, answer phone calls, update inventories of contact details and facilitate the meeting of deadlines by providing timely reminders.
The public sector job is managed by government bodies that include family service agencies or non-profit organisations. Some public sector jobs include industrial relations, health and administration.
Security is a major concern to all organisations which makes it an exciting and lucrative career choice. Security jobs include analyst, security manager, auditor, cyber security and safety.
The role of security guard is to protect premises, assets and personnel. Responsibilities include act lawfully in direct defense of property, evict violators, take accurate notes of unusual occurrences, report in detail any suspicious incidents, patrol regularly around the perimeter, monitor access at building entrances and watch alarm systems.