31 to 45 of 86
Sort by: Date | Relevance
Operations Security Advisor I Cloud Risk and Compliance Analyst Candidate will be expected to work on customer site up to two days per week. Provide Risk Management Framework (RMF) subject matter expertise to the client. Experience implementing security controls and compliance with a Cloud Service Provider CSP (AWS or Azure) Support ongoing compliance activities and monit
Posted 23 days ago
Processes credentialing and re credentialing applications for the client. Reviews applications and prepares verification letters. Contacts various departments, licensing agencies, and insurance carriers to complete credentialing and re credentialing applications. Provides support to the client in the collection and query of credentials of members of the client. Conducts P
Posted 7 days ago
Creates cyber intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state of the art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Leads the investigation of complex
Posted 23 days ago
Responsible for routine/basic inbound call, outbound call, email, and web chat services, as well as back office services. Performs services focused on customer satisfaction and adherence to established Service Level Agreements (SLAs). Completes daily routine tasks and responsibilities to support the Customer Service department or programs. Shift 9 30 AM 6 00 PM EST. Tempo
Posted 7 days ago
Responsible for routine/basic inbound call, outbound call, email, and web chat services, as well as back office services. Performs services focused on customer satisfaction and adherence to established Service Level Agreements (SLAs). Completes daily routine tasks and responsibilities to support the Customer Service department or programs. Shift 11 30 AM 8 00 PM EST. Temp
Posted 7 days ago
Enforces application security in all phases of the software development life cycle. Works closely with team members to define application security best practices, performs software architecture and design reviews, and supports the identification, interpretation, and remediation of vulnerabilities across a variety of applications, programming languages, and platforms. Mana
Posted 8 days ago
Supervises and coordinates activities of a team of IT members engaged in computer operations, computer systems, computer programming, and the company's network to assure effective computer resources are provided to users. Responsible for team productivity to ensure maximum output with a high Customer Satisfaction rating. Analyzes performance indicators such as number of t
Posted 25 days ago
Manages the creation of cyber intelligence tools / methods and oversees the research and analysis of cyber security risks. Directs the design and development of acceptance criteria for cyber security architecture. Gathers the necessary security intelligence, ensures the correlation of that intelligence with Company systems, analyzes the resulting threat from the relevant
Posted 8 days ago
Monitor and analyze security threats and vulnerabilities and implement appropriate countermeasures Ensure compliance with regulatory compliance directives, including various NIST security controls and monitoring and reporting requirements Manage incident response efforts and assist in investigations into security breaches Communicate and report to stakeholders on security
Posted 25 days ago
Responsible for hiring efforts for Management, Administrative, and Professional positions for Federal Agencies. Performs complex Position Classifications for General Schedule (GS) and Wage Grade (WG) positions to ensure that a well regulated classification program is maintained. Prepares position evaluation reports and communicates actions that must take place as a result
Posted 8 days ago
Provide Risk Management Framework (RMF) subject matter expertise to the client. Coordinate with Authorizing Officials, System Owners, Engineers, ISSO and other applicable teams to create and update SSPs, SARs, SIAs, Security Impact Analysis and other applicable documentation for legacy on prem and Cloud systems. Assess and determine the NIST 800 53 Control Status for mult
Posted 28 days ago
Responsible for routine/basic inbound call, outbound call, email, and web chat services, as well as back office services. Completes daily routine tasks and responsibilities to support the Customer Service department or programs. Shift 11 30 AM 8 00 PM EST Job Responsibilities Supports customer to submit and process transactions Assists customer with identifying and resolv
Posted 8 days ago
ASM Research, LLC
- Germantown, MD
Creates cyber intelligence tools / methods and performs research and analysis in order to mitigate and eliminate high level data and cyber security risks. Designs, tests and implements state of the art secure operating systems, networks, and database products. Conducts risk assessment and provides recommendations for application design. Job Responsibilities Draft, review,
Posted 29 days ago
Responsible for email, web chat services, as well as back office services. Completes daily routine tasks and responsibilities to support the Customer Service department or programs. Shift 8 00 AM 4 30 PM EST. Temporary role with potential end date of 6/30/2024. Job Responsibilities Supports customer to submit and process transactions Assists customer with identifying and
Posted 8 days ago
Designs and builds programs using a variety of software applications, techniques, and development tools. Writes basic or more routine programs according to specifications provided. Develops user interface features, site animation, and special effects. Develops code using Java, C#, HTML, Javascript, or other programming languages. Performs functionality and navigation test
Posted 8 days ago
Email this Job to Yourself or a Friend
Indicates required fields