- GovCIO (Lansing, MI)
- …Submit a referral to this job (https://careers-govcio.icims.com/jobs/5100/ rmf - information - system - security ... **Overview** GovCIO is currently hiring for an Information System Security Engineer...and NIST 800-53 requirements. -Leverages technical knowledge of IT, systems and networks to assess the client's security… more
- Huntington Ingalls Industries (Warren, MI)
- … security policies or plans for data, software applications, hardware, telecommunications, and information systems security within GVSC Labs in order to ... that systems are being operated securely, and information systems security policies and...and database products. + Coordinate with project teams in system consolidation, information security software… more
- Deloitte (Detroit, MI)
- …Advisory's Strategic Risk practice. Work You'll Do: + Analyze and define security requirements for applications and systems across all technology layers ... risk analyses of systems and applications during all phases of the system development life cycle. + Participate, and sometimes lead, in the planning, execution… more
- GovCIO (Lansing, MI)
- …(ie, CompTIA Security +(CE) + Demonstrated experience and understanding of DOD Security , RMF , and/or NIST Policies Preferred Skills and Experience + Strong ... be fully remote with a ~10% travel requirement. **Responsibilities** Gathers information concerning the capabilities of Company products; investigates the technical… more
- Optiv (Detroit, MI)
- …Loss Prevention, and data discovery + Provide advice to customers on data security and information governance + Effectively provide knowledge transfer and ... strategies, architectures and governance + Working knowledge of operating systems , virtual machine environments, mainframe security packages, and relational… more
- SMX (Lansing, MI)
- …key Department of Defense guidance and governance including DoD Cloud Computing Security Requirements Guide, Risk Management Framework ( RMF ), and Secure Cloud ... in delivery areas of Cloud, IT Infrastructure, Architecture, and Security as well as hands on core system...the configuration and uses of continuous monitoring tooling and Security and Information Event Management (SIEM) logging.… more