of passionate problem-solvers who are hungry to learn, grow, and make a difference. We’re on the lookout for Security Controls... and is committed to making the world a safer place by solving our clients’ toughest security challenges. But that’s not who...
of passionate problem-solvers who are hungry to learn, grow, and make a difference. We’re on the lookout for Security Controls... and is committed to making the world a safer place by solving our clients’ toughest security challenges. But that’s not who...
Security Controls Assessor The Opportunity: Cyber threats are everywhere, and the constantly evolving nature... of NIST Security Controls and the DoD Instruction 8500 Ability to work independently and as part of a team to complete...
What You Will Do: Guidehouse is looking for an experienced professional with experience assessing and advising on privacy controls of information... systems for federal organizations. Personnel assigned to this role will support the security and privacy compliance program...
Position Description: Valiant Solutions is seeking multiple Junior Security Controls Assessors to join our team... with deep expertise in NIST RMF processes, privacy and security controls, and enterprise-level risk assessment. This is a high...
Position Description: Valiant Solutions is seeking multiple Security Controls Assessors to join our team to support... with deep expertise in NIST RMF processes, privacy and security controls, and enterprise-level risk assessment. This is a high...
Responsibilities Peraton is looking for a Regional Cyber Security Assessor (RCSA) Analyst to become part... compliance to security controls and polices within established operating procedures for data access controls, storage...
Responsibilities Peraton is looking for a Regional Cyber Security Assessor (RCSA) Analyst to become part... compliance to security controls and polices within established operating procedures for data access controls, storage...
, and technical controls to identify gaps, non-compliance issues, and potential security vulnerabilities specific to ZT architecture... and associated controls and evaluate their effectiveness. Evaluate the effectiveness of ZT security mechanisms, including network...