Skip to content
Role Summary The CISO is responsible for overseeing and managing the organization's information security program, ensuring the protection of sensitive data and compliance with regulatory requirements. This role involves strategic planning, risk management, and collaboration with other departments to implement effective security measures. Main Responsibilities and duties Develop and implement a comprehensive information security strategy. Oversee the organization's cybersecurity policies and procedures. Conduct risk assessments and manage security audits. Ensure compliance with relevant laws... more ->
About Us Since 1989, SHI International Corp. has helped organizations change the world through technology. We've grown every year since, and today we're proud to be a $16 billion global provider of IT solutions and services. Over 17,000 organizations worldwide rely on SHI's concierge approach to help them solve what's next. But the heartbeat of SHI is our employees - all 7,000 of them. If you join our team, you'll enjoy: Our commitment to diversity, as the largest minority- and woman-owned enterprise in the U.S. Continuous professional growth and leadership opportunities. Health, wellness,... more ->
Joining the Secret Service, Office of Security, will allow you to be responsible for developing, coordinating, implementing, and overseeing security policies, programs, and standards to protect and safeguard the Secret Service's personnel, property, facilities, and information. To be considered qualified for this position you must meet the following qualification requirements for the respective grade level in which you are applying. You qualify for the GS-15 level (starting salary $169,279.00) if you possess one year of specialized experience equivalent to the GS-14 level performing duties... more ->
MANTECH seeks a motivated, career and customer-oriented Junior Information System Security Officer (ISSO) to join our team in Washington, D.C. Responsibilities include, but are not limited to: Ensure the day-to-day implementation, oversight, continuous monitoring, and maintenance of the security configuration, practices, and procedures for each IS. Ensure that selected security controls are implemented and operating as intended during all phases of the IS lifecycle. Ensure that system security documentation is developed, maintained, reviewed, and updated on a continuous basis Provide liaison... more ->