We are currently seeking a Cybersecurity Project Manager responsible for leading the design, implementation and management of Global Cybersecurity (GC..Share
As a CTI, you may work independently or as part of small, coordinated teams - ultimately under the supervision of Cryptologic Warfare Officers (four-y..Share
As a CTI, you may work independently or as part of small, coordinated teams - ultimately under the supervision of Cryptologic Warfare Officers (four-y..Share
Cyber Analyst Budget & Planning, Procurement and TPRM. State Street seeks to recruit a Cyber Analyst Budget & Planning, Procurement and TPRM who is ..Share
Posted 2 days ago
Never Miss New Jobs!
Get new cyber jobs from Rhode Island, US alerts sent directly
to your email!
STRATEGOS (est. 2008) is a Service-Disabled Veteran-Owned Small Business (SDVOSB) that identifies and provides usable solutions (non-personnel support..Share
As the Cyber Security Engineer, you will lead the implementation and continuous improvement of CMMC compliance frameworks for research and institution..Share
As a Security Engineer: Operate cyber security tools to monitor, identify and evaluate potential security events; research alerts that may indicate th..Share
Participate in Cybersecurity assessments to include conducting residual risk analysis and compiling Risk Management Framework for DoD IT artifacts. Re..Share
Federal Project Manager - Cyber Security The Federal Project Manager - Cyber Security will be the Lead Program Manager for Federal Program, working on..Share
Working at Abbott. At Abbott, you can do work that matters, grow, learn, care for yourself and your family, be your true self, and live a full life. Y..Share
Proven experience in cybersecurity consulting or advisory, ideally in a leadership role. Deep understanding of cyber risk, governance, compliance, and..Share
The qualified candidate should be well versed in identifying, assessing, managing and monitoring cyber risks across several domains such as Identity a..Share
The qualified candidate should be well versed in identifying, assessing, managing and monitoring cyber risks across several domains such as Identity a..Share