- Consumer Product Safety Commission (Bethesda, MD)
- …System Security Officer (ISSO). The incumbent serves as technical professional and IT Information Security Specialist with the responsibility for supporting the ... agency's cybersecurity program. Responsibilities This position is focused on vulnerability management and CPSC's Continuous Diagnostic and Mitigation (CDM) program… more
- Office of the Secretary of Transportation (Washington, DC)
- Summary DOT/OST will use Direct Hire Authority to fill Information Technology ( IT ) Specialist Information Security ( INFOSEC ) positions. This vacancy is a ... will not be updated UNLESS referred. Responsibilities As an IT Specialist , you will: GS-12 Duties: Support...access to systems, networks, and data. Conducts risk and vulnerability assessments of planned and installed information systems to… more
- Office of the Secretary of Transportation (Washington, DC)
- Summary DOT/OST will use Direct Hire Authority to fill Information Technology ( IT ) Specialist Information Security ( INFOSEC ) positions. This vacancy is a ... will not be updated UNLESS referred. Responsibilities As an IT Specialist , you will: Provide program advice...access to systems, networks, and data. Conducts risk and vulnerability assessments of planned and installed information systems to… more
- US Army Intelligence and Security Command (Fort Belvoir, VA)
- …a staff officer for a wide range of IA/cyber security initiatives and vulnerability management issues in support of AIE Cybersecurity Program and related activities. ... Requirements Conditions of Employment Qualifications Who May Apply: Only applicants who meet one of the employment authority categories below are eligible to apply for this job. You will be asked to identify which category or categories you meet, and to… more
- Department of State - Agency Wide (Washington, DC)
- …will not be sent to applicants who respond to this flyer. Responsibilities As an IT Specialist ( INFOSEC ), at minimum you will: Ensures the confidentiality, ... security programs, policies, procedures, and tools. Administers information technology ( IT ) principles, methods, and security products to protect and maintain… more