Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
Job Description and Requirements
Information Security Assurance Administrators strengthen the organization's information security posture through the construction, socialization and performance measurement of policies and procedures based on best practices, adopted frameworks, and risk assessment activities.
Essential Functions and Responsibilities:
Requirements:
Skills and/or Certifications/Licensing
All qualified applicants will receive consideration for employment without regard to race, color, sex, sexual orientation, gender identity, religion, national origin, disability, veteran status, or other legally protected status.
Official account of Jobstore.
Cyber Security Assurance Specialist Preston(Hybrid working) £55-£62k+10% Bonus
My client are Europe's largest Aerospace & Defence organisation.
They are currently looking for an experienced Cyber Security proffesional to join their team based out of their Preston office.
What you will be doing:
* Deliver assurance services to the business, SS EIT, IM&T Sector and Group Functions, covering enterprise systems / services and cloud
* Identification of risk and appropriate mitigations, development & analysis of secure solutions (covering technical / physical / procedural / personnel controls) and assessment of compliance with internal and external standards and regulations
* Deliver documentation to demonstrate compliance to internal and external stakeholders
* Assessment and provision of control effectiveness in managing Cyber security risk
* Provide security architecture / technical input into the development of secure solutions
* Coaching and mentoring junior members of the team
* Support development of strategy and continual service improvement for the Cyber assurance function
* Act as a subject matter expert regarding Cyber assurance activities for the wider organisation
Essential Skills:
* Knowledge of information security standards, such as HMG, NCSC Guidance, ISO 27001/18, NIST 800 etc. HMG is fundamental
* Capable of a very high standard of written communication including experience of writing complex reports and giving formal presentations to senior business peers
* Educated to degree level (or equivalent) preferably in a related discipline (ICT/Computing, Information assurance, risk management, vulnerability/threat assessment) or equivalent, related work experience
* In-depth knowledge of industry standard security policy, standards and good practice guidance and their application to a variety of IT solutions processing protectively marked information
To apply for this role please forward your cv to Peter Bibby on the email address below...
Official account of Jobstore.
Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Johnson, LA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Riley, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Cavazos, TX. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Stewart, GA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Bliss, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Liberty, NC The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Campbell, KY The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Aberdeen Proving Ground, MD The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$75,200 - 158,100 USDOfficial account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Drum, NY. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
About ByteDance
Founded in 2012, ByteDance's mission is to inspire creativity and enrich life. With a suite of more than a dozen products, including TikTok, Helo, and Resso, as well as platforms specific to the China market, including Toutiao, Douyin, and Xigua, ByteDance has made it easier and more fun for people to connect with, consume, and create content.
Why Join Us
Creation is the core of ByteDance's purpose. Our products are built to help imaginations thrive. This is doubly true of the teams that make our innovations possible.
Together, we inspire creativity and enrich life - a mission we aim towards achieving every day.
To us, every challenge, no matter how ambiguous, is an opportunity; to learn, to innovate, and to grow as one team. Status quo? Never. Courage? Always.
At ByteDance, we create together and grow together. That's how we drive impact - for ourselves, our company, and the users we serve.
Join us.
About the Security Penetration Lab Team at ByteDance
The team is missioned to build infrastructures, platforms and technologies, as well as to support cross-functional teams to protect our users, products and infrastructures. In this team, you'll have a unique opportunity to have first-hand exposure to the strategy of the company in key security initiatives, especially in building scalable and secure-by-design systems and solutions. Our challenges are not your regular day-to-day technical problems; you'll be part of a team that's developing new solutions to new challenges of a kind not previously addressed by big tech. It's working fast, at scale, and we're making a difference.
Responsibilities
- Continuously design and conduct penetration testing to determine if infrastructure components, systems and applications meet confidentiality, integrity, authentication, availability, authorisation, and nonrepudiation standards in the staging/production environment.
- Translate requirements into test plan, write and execute test scripts or codes in line with standards and procedures to determine vulnerability to attacks.
- Certify infrastructure components, systems and applications that meet security standards.
- To identify risks and actively take ownership to resolve any potential project issues.
- Conduct technical security reviews for any new products and feature requirements.
- Provide security engineering support to product teams to help identify potential security flaws in the early stages of SDLC.
- Collaborate closely with other parts of the security team and product teams to design defense-in-depth controls that limit attackers' ability and improve our security postures.
- Continuously conduct security research and strive to innovate.
Qualifications
- Background in Computer Science, Computer Engineering, Information Systems or other STEM disciplines.
- Strong knowledge in some of these various disciplines: web application security, mobile app security, cloud security and thick client security.
- Solid experience in writing and reviewing code in at least one of the following programming languages: JavaScript (Node JS), Go, Python, Java, C++, Rust.
- Good project management skills and focused teamwork.
Preferred Requirements
- CTF players, live competitions and hacking events experience.
- CVEs (excluding vulnerabilities such as XSS, CSRF in random CMS) are preferred.
- BugBounty experience with reputable statistics in HackerOne, BugCrowd etc.
ByteDance is committed to creating an inclusive space where employees are valued for their skills, experiences, and unique perspectives. Our platform connects people from across the globe and so does our workplace. At ByteDance, our mission is to inspire creativity and enrich life. To achieve that goal, we are committed to celebrating our diverse voices and to creating an environment that reflects the many communities we reach. We are passionate about this and hope you are too.
Official account of Jobstore.
Let's Write Africa's Story Together!
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.
Job Description
To support the Head of Governance, Risk and Compliance by embedding and maturing the Information Security and Information Technology capabilities, and posture. The candidate is primarily responsible for defining, creating and monitoring of policies, frameworks, controls and related standards in alignment with legislation, regulatory compliance and to support strategy delivery. The Information Security Officer (ISO) will support enablement and embedding of the Information Security Assessment Centre. They will provide information security risk management and cybersecurity expertise to the business segments. The ISO is expected to work independently to advise and influence technology, and business personnel regarding the safeguarding of information, applications, systems, infrastructure to manage information risks.Governance
Regulatory
Compliance
Leadership
Business Segment Risk Embedment and Oversight
Requirements:
ADDITIONAL QUALIFICATIONS/EXPERIENCE (PREFERRED, NOT A REQUIREMENT)
Skills
Education
Closing Date
30 March 2024The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.
Old Mutual Limited is pro-vaccination and encourages its workforce to be fully vaccinated against Covid-19.
All prospective employees are required to disclose their vaccination status as part of the recruitment process.
Please refer to the Old Mutual’s Covid-19 vaccination policy for further detail. Kindly note that Old Mutual reserves the right to reinstate the requirement to vaccinate at any point if it is of the view that it is imperative to do so.
The Old Mutual Story!
Official account of Jobstore.
Let's Write Africa's Story Together!
Old Mutual is a firm believer in the African opportunity and our diverse talent reflects this.
Job Description
The Information Security Analyst (ISA) will provide information security risk support and cybersecurity expertise to the business segments. The support will take the form of operational risk analysis and assessments through the demand management and request tracking tools, consultancy, policy and standards best practice guidance, and process improvements. The ISA will be required to work with project teams, service providers, and business units internal and external to the IT function. The candidate is expected work with leadership and guidance from the Information Security Officer’s and/or the Lead Information Security Analyst, to support and influence technology and business personnel regarding the value and methods of safeguarding information, applications, systems, infrastructure, and work practices are optimized so that the information risks are properly managed.Role Requirements
Skills
Education
Closing Date
26 March 2024The appointment will be made from the designated group in line with the Employment Equity Plan of Old Mutual South Africa and the specific business unit in question.
Old Mutual Limited is pro-vaccination and encourages its workforce to be fully vaccinated against Covid-19.
All prospective employees are required to disclose their vaccination status as part of the recruitment process.
Please refer to the Old Mutual’s Covid-19 vaccination policy for further detail. Kindly note that Old Mutual reserves the right to reinstate the requirement to vaccinate at any point if it is of the view that it is imperative to do so.
The Old Mutual Story!
Official account of Jobstore.
Careers in legal can be found in the local and private sector to ensure the company runs smoothly by providing administrative support to solicitors and legal executives. Legal jobs comprise of solicitor, lawyers, corporate attorney, compliance officer, risk manager, judges, paralegal, tax adviser, internal auditor, legal assistant and legal counsel.
The role of legal assistant is to ensure the smooth running of the office and effective case management. Responsibilities include providing administrative support to lawyers, handle communication with clients, administratively attend trials, prepare case briefs, conducting documentary research, develop case relevant information, file basic legal documents, answer phone calls, maintain contact lists and monitor deadlines.
The role of corporate lawyer is to ensure a company’s transactions comply with corporate law and regulations. Responsibilities include preparing the appropriate legal documents for court proceedings, evaluate new business partnerships, cooperate with law firms, represent the company in legal proceedings, oversee the company’s policy on legal matters, protecting the company against legal risks, negotiate deals on behalf of the company and guide management on compliance issues.
The role of lawyers is to represent clients in criminal and civil litigation as well as other legal proceedings. Responsibilities include question witnesses during the course of a trial, interpret laws for individuals, summarise cases to judges/juries, prepare legal briefs, analyse the probable outcomes of cases, examine legal data to determine advisability, cooperate with legal firms, help develop federal and state programs.
The role of legal advisor is to provide legal advice, organise various legal activities, create legal documents and advise the clients on all the relevant legal issues. Responsibilities include conduct legal analysis, involved in drafting different legal submissions, assist in reviewing legal material and draw up formalities regarding the settlement of disputes.
The role of compliance officer is to ensure that the operations and business transactions follow all relevant legal rules. Responsibilities include implementing an effective legal compliance program, createsound internal controls, draft company policies, proactively audit processes, evaluate business activities to assess compliance risk, collaborate with external auditors, educate employees on regulations and industry practices.
The role of company secretary is to undertake a variety of administrative and clerical tasks. Responsibilities include effectively communicating with clients, greet visitors, attend trials, write case briefs, conduct thorough documentary research, verify important case intelligence, preserve an updated case record system, answer phone calls, update inventories of contact details and facilitate the meeting of deadlines by providing timely reminders.
The public sector job is managed by government bodies that include family service agencies or non-profit organisations. Some public sector jobs include industrial relations, health and administration.
Security is a major concern to all organisations which makes it an exciting and lucrative career choice. Security jobs include analyst, security manager, auditor, cyber security and safety.
The role of security guard is to protect premises, assets and personnel. Responsibilities include act lawfully in direct defense of property, evict violators, take accurate notes of unusual occurrences, report in detail any suspicious incidents, patrol regularly around the perimeter, monitor access at building entrances and watch alarm systems.