requirements, data sovereignty, and regulatory frameworks. Proficiency with IAM, KMS, Secrets Manager, GuardDuty, Security Hub... Management Partner with government program teams, security offices, and external vendors to drive cloud initiatives...
(IAM Level III), or Certified Information Security Manager (CISM) Strong knowledge of enterprise computing and operating... support to facilitate operations on a critical infrastructure and services program. This effort focuses on providing...
for IP networks, RACF security for Unix System Services, zSecure, Linux Knowledge of IAM (Identity Access Management...) software products a plus. Knowledge of IP networks; NetAccess z/OS Communications Server knowledge a plus. Ability to program...
(IAM Level III), or Certified Information Security Manager (CISM) Strong knowledge of enterprise computing and operating... support to facilitate operations on a critical infrastructure and services program. This effort focuses on providing...
(IAM Level III), or Certified Information Security Manager (CISM) Strong knowledge of enterprise computing and operating... support to facilitate operations on a critical infrastructure and services program. This effort focuses on providing...
Assurance (IA) program in the Ft. Meade area. This role contributes to one of the community’s most advanced RMF-based programs... Information System Security Manager (ISSM) in maintaining operational security posture. Own and manage multiple System Security...
issues to the EHR Specialist II or EHR Applications Manager. Additional responsibilities include: Serve as the first point... onboarding/offboarding workflows are consistently followed for EHR user access, to align with Identity Access Management (IAM...
requirements. Coordinate with program management and customers to mitigate risks and ensure compliance with DoD IA requirements... to Project Manager. Responsible to decompose system specifications to determine security/IA requirements and work with systems...
) using Terraform or Deployment Manager Experience supporting and optimizing CI/CD pipelines with GitLab CI, Jenkins or Cloud... structure Management and policy configuration Hands-on experience with AWS services (EC2, S3, IAM, Lambda, CloudFormation...
processes and ensures quarterly PAM objectives are met as part of the overall Mission Padlock program. The analyst... is responsible for generating weekly/monthly/quarterly metrics across the PAM program. Understanding identity and access management...
relating to them. Serves as technical expert to the Cybersecurity Assessment Program providing technical direction... Associate (OCA), Oracle WebLogic Server 12c Administrator, Oracle Java SE 8 Programmer I, Oracle Enterprise Manager 12c...
as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland America Princess (Brands...). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining compliance in accordance with GCS...
environment operations as well as support of identity access management (IAM) for the Holland America, Seabourn, and Holland... America Princess (Brands). This role requires assisting the GCS IAM team with bringing the Brands into and maintaining...
program supporting the ARIMS family of applications. Essential Job Duties Directly interface with application development... OMB and NARA policies and initiatives related to electronic records management. Act as a project manager when assigned...
large-scale migration and operations on a large, high-profile DOD contract. The I3TS program provides enterprise-wide IT... management (IAM), Microsoft Entra ID (formerly Azure Active Directory), and cross-cloud interoperability. The selected candidate...
, AppSec, SecOps, IAM, and Data Privacy programs, translating industry frameworks into pragmatic controls, policies.....and more.\n \n \n \n \n \n RESPONSIBILITIES: \n \n \n * Drive the cybersecurity program: Partner daily with stakeholders...
, AppSec, SecOps, IAM, and Data Privacy programs, translating industry frameworks into pragmatic controls, policies.....and more.\n \n \n \n \n \n RESPONSIBILITIES: \n \n \n * Drive the cybersecurity program: Partner daily with stakeholders...
, AppSec, SecOps, IAM, and Data Privacy programs, translating industry frameworks into pragmatic controls, policies.....and more.\n \n \n \n \n \n RESPONSIBILITIES: \n \n \n * Drive the cybersecurity program: Partner daily with stakeholders...
, AppSec, SecOps, IAM, and Data Privacy programs, translating industry frameworks into pragmatic controls, policies.....and more.\n \n \n \n \n \n RESPONSIBILITIES: \n \n \n * Drive the cybersecurity program: Partner daily with stakeholders...
, AppSec, SecOps, IAM, and Data Privacy programs, translating industry frameworks into pragmatic controls, policies.....and more.\n \n \n \n \n \n RESPONSIBILITIES: \n \n \n * Drive the cybersecurity program: Partner daily with stakeholders...