The UCF Team invites you to review and provide feedback on the mapping of Software & IT Ser ...
Read MoreThe UCF Team invites you to review and provide feedback on the mapping of ISO 37000:2021, G ...
Read MoreThe essential duties and responsibilities include: Monitor computer networks for security issues. Investigate security breaches and other cyber security incidents and leads incident response, documentation, and damage assessment activities Leads Installation of security measures and operate software ...
Read MoreJob Description Experienced product manager with background in cloud technology and related compliance and security requirements. You ll own the IBM Cloud Compliance Framework, incorporating new and changing compliance standards, regulations, frameworks and best practices, ...
Read MoreThe Public Comment period for CIS Amazon Linux 2 Benchmark, v.2.0.0, Level 2
Read MoreNIST SP 800-160, Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, Volume 2AD ID: 3482Status: ReleasedAvailability: FreeCitation Format: ¶ (Numbered Paragraphs)Document Type: NIST SP 800-160, Developing Cyber-Resilient Systems: A Systems Security Engineering Approach, Volume 2Originator: US National Institute of Standards and ...
Read MoreDescription Work you’ll do: Strategic Aligns with leadership and actively contribute to the development, implementation, and maintenance of a firm’s technology risk management strategy, methodology and culture. Analyzes trends in multinational and local client, regulator ...
Read MoreWe are currently seeking a Senior Management Analyst/ Navy Qualified Validator at our NUWC, Middletown, RI site. Job Description: The Support Analyst/ Navy Qualified Validator is responsible for assisting in verifying that all NUWCDIVNPT enterprise ...
Read MoreJob Description: The Defense Group at Leidos as an exciting opportunity as an Information System Security Officer (ISSO) on our GSM-O II IDIQ contract’s Joint Service Provider (JSP) Cyber Security Task Order in Alexandria, VA. ...
Read MoreResponsibilities Establish and maintain a roadmap for security audit programs Maintain cybersecurity program policies, standards, procedures, and best practices Scope and manage security and privacy audits for multiple frameworks (SOC2, ISO, HIPAA, etc); Additionally, serve ...
Read More