Your Browser is Not Supported
To ensure jobstore run smoothly, please use the latest version of the following supported browsers:
ACI is seeking a Cyber Security Engineer to join our team in Fort Liberty, NC The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Aberdeen Proving Ground, MD The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$75,200 - 158,100 USDOfficial account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Drum, NY. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Campbell, KY The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
Make banking a Fifth Third better®
We connect great people to great opportunities. Are you ready to take the next step? Discover a career in banking at Fifth Third Bank.
The Principal Information Security Engineer on our EVM team will be supporting the continuous vulnerability remediation process and reduce the Fifth Third Bank’s attack surface across cloud and traditional infrastructure, endpoints, and applications. This role is responsible for managing vulnerabilities from various scanning tools, analyzing, prioritizing, and communicating relevant, actionable information across the bank and our lines of business (LOBs).
MINIMUM KNOWLEDGE, SKILLS AND ABILITIES REQUIRED:
Fifth Third Bank, National Association is proud to have an engaged and inclusive culture and to promote and ensure equal employment opportunity in all employment decisions regardless of race, color, gender, national origin, religion, age, disability, sexual orientation, gender identity, military status, veteran status or any other legally protected status.
Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Johnson, LA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Riley, TX The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Cavazos, TX. The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$61,600 - $129,300Official account of Jobstore.
ACI is seeking a Cyber Security Engineer to join our team in Fort Stewart, GA The ideal candidate will be responsible for ensuring IT system compliance with all applicable laws, DoD policies, and standards. Perform system scans, analyze results, and write necessary reports and plans. Provide Network Environment (NE) and Computing Environment (CE) support, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA). Develop and implement Standard Operating Procedures (SOPs), System Security Plans (SSP), Plans of Actions and Milestones (POA&Ms), and other related documents to satisfy Assessment and Authorization (A&A) requirements per NIST 800-53, FISMA, Risk Management Framework (RMF) and other government guidelines, as required to achieve and maintain an ATO (Authority to Operate).
What You’ll Get to Do:
Apply instructions and pre-established guidelines to perform IA tasks within CE and NE.
Provide end-user support for all CE operating systems, peripherals, and applications.
Support, monitor, test, and troubleshoot hardware and software IA problems about their CE.
Apply appropriate CE and NE access controls.
Implement applicable patches including IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA) for the CE operating system(s).
Install, test, maintain, and upgrade network operating systems software and hardware to comply with IA requirements.
Support Security Test and Evaluations (Part of A&A Process).
More About the Role:
Implement and apply technologies, processes, and practices designed to protect networks, devices, programs, and data from malicious attack, damage, or unauthorized access.
Maintain computer systems, networks, and other related device, including implementing all applicable IA vulnerability alerts (IAVA), IA vulnerability bulletins (IAVB), and technical advisories (TA).
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. May provide intrusion support to high technology investigations in the form of network assessments.
Researches and maintains proficiency in tools, techniques, countermeasures, and trends in computer and network vulnerabilities, data hiding and network and device security and encryption. Performs duties in support of in-house and external customers.
Configures and validates secure systems, and tests security products/systems to detect computer and information security weaknesses.
Generates security architecture documentation.
Provides critical written and verbal analyses of previously generated security architecture documentation and vulnerability and risk assessments.
Develop and implement documentation to satisfy NIST 800-53, FISMA, and Risk Management Framework (RMF) requirements. Designs and implements Plans of Action and Milestones (POAM) to remediate findings from vulnerability and risk assessments. Provides information assurance for digital information, ensuring its confidentiality, integrity, and availability. Responsibilities include monitoring and testing of IT systems for vulnerabilities and indications of compromise, incident response and remediation, and compliance with applicable government and other external standards.
You’ll Bring These Qualifications:
An active DoD TS/SCI Clearance.
Be able to obtain a Poly.
Must have at least 5 years of interpreting and implementing DoD directives, instructions, and policies that provide direction and guidance and applying them to CE and NE.
Knowledge of the Assessment & Authorization (A&A), and NIST RMF processes.
Experience installing, maintaining, administering, and troubleshooting computer systems and networks.
Experience with network security architecture to include, but not limited to firewalls, intrusion detection/prevention systems (IDS/IPS), content filtering devices, encryption devices, and DoD Public Key Infrastructure (PKI).
Qualified at the IAT Level II for the DoD Information Assurance Workforce, must possess one of the following certifications: CCNA-Security, GICSP, GSEC, Security+, or SSCP.
These Qualifications Would be Nice to Have:
An active DoD TS/SCI with Poly Clearance.
Familiar with scanning tools (e.g. NESSUS, ACAS, etc.). Familiar with Distributed Common Ground System (DCGS).
Technical Writing experience (creating/updating IA policy & procedure documentation).
Excellent written and verbal communication skills with strong presentation abilities.
Must be able to work well on independent engagements as well as within a team setting; Strong client presence and interaction abilities.
Excellent understanding of common computing platforms, including Windows Server, RedHat Linux Server, and vendor-specific appliance support.
Some understanding of military hierarchy.
What We Can Offer You:
- We’ve been named a Best Place to Work by the Washington Post.
- Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives.
- We offer competitive benefits and learning and development opportunities.
- We are mission-oriented and ever vigilant in aligning our solutions with the nation’s highest priorities.
- For over 60 years, the principles of CACI’s unique, character-based culture have been the driving force behind our success.
Company Overview:
CACI is an Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, status as a protected veteran, or any other protected characteristic.
Pay Range: There are a host of factors that can influence final salary including, but not limited to, geographic location, Federal Government contract labor categories and contract wage rates, relevant prior work experience, specific skills and competencies, education, and certifications. Our employees value the flexibility at CACI that allows them to balance quality work and their personal lives. We offer competitive compensation, benefits and learning and development opportunities. Our broad and competitive mix of benefits options is designed to support and protect employees and their families. At CACI, you will receive comprehensive benefits such as; healthcare, wellness, financial, retirement, family support, continuing education, and time off benefits. Learn more here
The proposed salary range for this position is:
$65,000 - $136,500Official account of Jobstore.
Job Description:
Parsons is looking for an amazingly talented Information System Security Officer to join our team! In this role you will get to maintain security operations for various specialized applications.
What You'll Be Doing:
What Required Skills You'll Bring:
What Desired Skills You'll Bring:
Minimum Clearance Required to Start:
Top Secret SCI w/PolygraphThis position is part of our Federal Solutions team.Our Federal Solutions segment delivers resources to our US government customers that ensure the success of missions around the globe. Our diverse, intelligent employees drive the state of the art as they provide services and solutions in the areas of defense, security, intelligence, infrastructure, and environmental. We promote a culture of excellence and close-knit teams that take pride in delivering, protecting, and sustaining our nation's most critical assets, from Earth to cyberspace. Throughout the company, our people are anticipating what’s next to deliver the solutions our customers need now.Salary Range:
$83,300.00 - $145,800.00We value our employees and want our employees to take care of their overall wellbeing, which is why we offer best-in-class benefits such as medical, dental, vision, paid time off, 401(k), life insurance, flexible work schedules, and holidays to fit your busy lifestyle!The position may require a COVID vaccination or an approved accommodation/exemption for a disability/medical condition or religious belief as required by customer requirements and some cases federal, state, provincial or local mandates.
Parsons is an equal opportunity employer committed to diversity, equity, inclusion, and accessibility in the workplace. Diversity is ingrained in who we are, how we do business, and is one of our company’s core values. Parsons equally employs representation at all job levels for minority, female, disabled, protected veteran and LGBTQ+.We truly invest and care about our employee’s wellbeing and provide endless growth opportunities as the sky is the limit, so aim for the stars! Imagine next and join the Parsons quest—APPLY TODAY!Official account of Jobstore.
Title:
Information Security EngineerKBR is seeking an Information Security Engineer (ISSO/ISSE) to join our GSUS, Defense Systems Engineering- Naval Solutions Division. The Information Security Engineer will primarily support the Joint Technical Data Integration (JTDI) program by providing advice and assistance to the Government regarding the secure configuration and operation of the JTDI package, interfaces, and modernization efforts.
In This Role, You Will...
BASIC REQUIREMENTS
Citizenship: Must be a US Citizen
Clearance: An active/current Secret Clearance with eligibility to obtain TS.
Certifications: Must have a CompTIA Security + CE
Experience: At least 3-5 years of experience supporting CyberSecurity programs as an Information System Security Officer (ISSO), including experience with...
Highly Desired Experience
This position offers a flexible remote workplace setting.
Scheduled Weekly Hours: 40 hours/week
Benefits + More
When you become part of the KBR team, your career opportunities are endless. Our people are the heart of everything we do here at KBR. We Value our People!
KBR offers a selection of competitive lifestyle benefits which could include a 401K plan with company match, medical, dental, vision, life insurance, AD&D, flexible spending account, disability, paid time off, or flexible work schedule. We support career advancement through professional training and development.
KBR may offer bonuses, commissions, or other forms of compensation to certain job titles or levels per internal policy or contractual designation. Additional compensation may be in the form of a sign-on bonus, relocation benefits, short-term incentives, long-term incentives, or discretionary payments for exceptional performance.
At KBR, we are passionate about our people, sustainability, and our Zero Harm culture. These ideals form all that we do and are at the heart of our commitment to, and ongoing journey toward, being a more inclusive and diverse company. That commitment is central to our team of team’s philosophy and fosters an environment of real collaboration across cultures and locations. Our individual differences and perspectives bring enhanced value to our teams and help us develop solutions for the most challenging problems. We understand that by embracing those differences and working together, we are more innovative, more resilient, and safer. We Deliver — Together.
KBR is an equal-opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
KBR is an equal opportunity employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, disability, sex, sexual orientation, gender identity or expression, age, national origin, veteran status, genetic information, union status and/or beliefs, or any other characteristic protected by federal, state, or local law.
Official account of Jobstore.
About Team:
At Walmart, we prioritize innovation and data security. Our team is dedicated to maintaining a secure operating environment and preserving the trust of our customers, associates, and stakeholders. We combine a range of services and expertise to prevent fraud, detect threats, and manage digital risk and access. Our focus is on mitigating attack risks, securing cloud transformation, and fostering a culture of security and reliability within our team
What you'll do:
This leader will be directly responsible for the strategy related to security control gap remediation.
Support with stakeholder alignment and scoping preparations for new audit engagements
Help drive engagement and sample collection
Support early development of management action plans (MAPs) to include evidence collection milestones and key risk indicators, and collection of identified artifacts
Support with roadblock resolution, escalation, and status updates
Analyze identified root cause patterns
Rationalize remediation activities & drive the holistic resolution
Communicate root cause patterns across Global Tech for efficient and effective remediation
Coordinate with relevant stakeholders, such as Global Tech teams, vendors, legal, data governance, and compliance teams.
Provide SME resources and knowledge dissemination to educate and support business and global tech teams on holistic remediation of control gaps.
What you'll bring:
Partnering with business and technology stakeholders to solve challenging problems.
Foster mentoring relationships to grow associates.
Working effectively cross-functionally and communicating data and insights to InfoSec department and Global Tech leadership team.
A passion for building and executing on strategies that help your team and stakeholders be successful.
The ability to influence others, manage stakeholders, gain buy-in from leadership, and communicate clearly.
About Walmart Global Tech
Imagine working in an environment where one line of code can make life easier for hundreds of millions of people. That’s what we do at Walmart Global Tech. We’re a team of software engineers, data scientists, cybersecurity expert's and service professionals within the world’s leading retailer who make an epic impact and are at the forefront of the next retail disruption. People are why we innovate, and people power our innovations. We are people-led and tech-empowered. We train our team in the skillsets of the future and bring in experts like you to help us grow. We have roles for those chasing their first opportunity as well as those looking for the opportunity that will define their career. Here, you can kickstart a great career in tech, gain new skills and experience for virtually every industry, or leverage your expertise to innovate at scale, impact millions and reimagine the future of retail.
Flexible, hybrid work:
We use a hybrid way of working that is primarily in office coupled with virtual when not onsite. Our campuses serve as a hub to enhance collaboration, bring us together for purpose and deliver on business needs. This approach helps us make quicker decisions, remove location barriers across our global team and be more flexible in our personal lives.
Benefits:
Benefits: Beyond our great compensation package, you can receive incentive awards for your performance. Other great perks include 401(k) match, stock purchase plan, paid maternity and parental leave, PTO, multiple health plans, and much more.
Equal Opportunity Employer:
Walmart, Inc. is an Equal Opportunity Employer – By Choice. We believe we are best equipped to help our associates, customers and the communities we serve live better when we really know them. That means understanding, respecting and valuing diversity- unique styles, experiences, identities, ideas and opinions – while being inclusive of all people.
The above information has been designed to indicate the general nature and level of work performed in the role. It is not designed to contain or be interpreted as a comprehensive inventory of all responsibilities and qualifications required of employees assigned to this job. The full Job Description can be made available as part of the hiring process.
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 7years’ experience in information security or related area at a technology, retail, or data-driven company.Option 2: 9 years’ experience in information security or related area at a technology, retail, or data-driven company.Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Certification in Security+, GISF, CISM, or CISA, Master’s degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 5 years’ experience leading information security or cybersecurity projects.Official account of Jobstore.
About this position: Security Technology Specialist
This role provides support to the business needs for stake holders, customers, and associates. Responsibilities include managing day to day scheduling with minimal supervision, and making decisions that improve security, while following the Every Day Low Cost model.
You’ll make an impact by…
Installing, Maintaining, Testing Burglar, Fire alarms and Voice Evacuation system as well as Video Surveillance systems.
Assists in ensuring code compliance by achieving, maintaining, and enforcing all required licenses and certifications for national electrical and fire codes according to local, state, and federal regulations (for example low voltage licenses, fire alarm licenses, National Institute Certifying Engineering Technology certifications, National Burglar and Fire Alarm Association trainings, National Electric Code requirements, National Fire Protection Association (NFPA) 72, NFPA 731, NFPA 101).
Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders. identifies business needs. Monitors progress and results. Recognizes and capitalizes on improvement opportunities. Adapts to competing demands, organizational changes, and new responsibilities.
Provides customer service to multiple stakeholders (for example, associates, vendors, suppliers) by tracking, managing, and adapting performance. Develops, supports, and guides associate decision-making and actions. Identifies security system upgrades. Obtains and integrates necessary resources for daily operational execution to meet and exceed stakeholder needs and expectations.
Conducts security program surveys and assessments across all operational formats by understanding security policies and procedures. Reviews facility compliance with security control measures.
Determines the extent of operational effectiveness to meet security control measure requirements. Documents and reports on assessment findings. Conducts follow-up on finding exceptions.
Demonstrates up-to-date expertise and applies this to the development, execution, and improvement of action plans by providing expert advice and guidance to others in the application of information and best practices; supporting and aligning efforts to meet customer and business needs; and building commitment for perspectives and rationales.
Provides and supports the implementation of business solutions by building relationships and partnerships with key stakeholders; identifying business needs; determining and carrying out necessary processes and practices; monitoring progress and results; recognizing and capitalizing on improvement opportunities; and adapting to competing demands, organizational changes, and new responsibilities.
Models’ compliance with company policies and procedures and supports company mission, values, and standards of ethics and integrity by incorporating these into the development and implementation of business plans; using the Open Door Policy; and demonstrating and assisting others with how to apply these in executing business processes and practices.
Live our Values - Servant Leadership - Is consistently humble, self-aware, honest, and transparent.
Embrace Change - Digital Transformation & Change - Implements and supports continuous improvements and willingly embraces new digital tools and ways of working.
Deliver for the Customer - Strategic Thinking - Adopts a broad perspective that considers data, analytics, customer insights, and different parts of the business when making plans.
Focus on our Associates - Diversity, Equity & Inclusion - Embraces diversity in all its forms and actively supports diversity of ideas and perspectives, as well as diversity goal programs.
Live our Values - Culture Champion - Models the Walmart values to foster our culture; holds oneself accountable; and supports Walmart's commitment to communities, corporate social responsibility, and sustainability; maintains and promotes the highest standards of integrity, ethics and compliance.
Focus on our Associates - Talent Management - Contributes to an environment allowing everyone to bring their best selves to work, demonstrates engagement and commitment to the team, and recognizes others' contributions and accomplishments.
Focus on our Associates - Collaboration & Influence - Builds strong and trusting relationships with team members and business partners; works collaboratively to achieve objectives; communicates with impact to a range of audiences; and demonstrates energy and positivity for own work.
Deliver for the Customer - Customer Focus – Helping our stores and Clubs is the number one priority.
Outlined below are the required minimum qualifications for this position. If none are listed, there are no minimum qualifications.
• 1 year's experience using Microsoft Office applications (for example, Word, Excel, Outlook).Outlined below are the optional preferred qualifications for this position. If none are listed, there are no preferred qualifications.
Associate's or vocational degree in Electronic Technology or Computer Science., Commercial security systems, including fire, burglar, CCTV, access control, and/or security assessments., National Institute for Certification in Engineering Technologies Certification in Fire (Level II) and Video (Level I).Official account of Jobstore.
Official account of Jobstore.
Official account of Jobstore.