SAIC | Cyber

  • Cybersecurity Services

    Our discover-mitigate-manage approach provides threat and vulnerability profiles, remediation, and managed services via a process-oriented yet modular solution that starts at the beginning or at any point of the cybersecurity life cycle.

  • Next-Generation DNS Services

    Our innovative set of capabilities extends your enterprise’s defensive edge beyond network boundaries and all the way to the root of attacks, providing unparalleled cyber situational awareness that results in resilient and continuous services.

  • Advanced Cyberspace Operations

    The experienced cyber specialists we have provide mission integrity through their deep understanding of adversaries’ motives, techniques, and tactics, developing behavior-based threat detection and rapid security and defense responses.

  • Assurance and Certification

    Protecting the integrity, availability, authenticity, and confidentiality of information is unquestionably critical to mission success. We provide assessment, authorization, and certification services, along with associated vulnerability scanning and management activities, delivering mission assurance and excellent ratings.


Cyber Security | Financial Times

Cookies on FT Sites

We use


for a number of reasons, such as keeping FT Sites reliable and secure, personalising content and ads, providing social media features and to analyse how our Sites are used.

Manage cookies Accept & continue

Open drawer menuOpen search barFinancial TimesmyFT

Search the FT


Financial Times

Search the FT


Cybersecurity – Our latest thinking | EY

Smart meters usher in the digitalization of power distribution networks, which open up entirely new abilities and possibilities.

For the electricity company, all the aggregated data could be combined with generation data to better manage the anticipated load, by modelling how different parts of the country are using electricity and predicting where to transmit it. Smart meters also enable huge savings in human hours, as engineers will no longer need to visit a home every time troubleshooting and disconnections or reconnections of supply are needed– as many functions can be done virtually.

For consumers, smart meters provide much greater and more immediate information on their energy use, and faster, more accurate billing too. Greater insight enables greater control, so it is expected that many consumers will reduce their energy consumption – and their bills.

In the future, there will be many other parties that energy companies could share consumption data with, so they can offer different tariffs, better advice on how to use energy, or explore other opportunities and business models that are still to be created.

None of this would be possible without a high-level of cybersecurity, designed to build in the appropriate cyber risk management and mitigation from the outset, so that the organization could operate with confidence.

For this electricity company, EY teams were able to offer something truly different: an awareness of the specific unique challenges that smart meters introduce. This rollout touches every single citizen of a country in a way other systems do not, and there is a bond of trust that must not be broken.

EY consultants understand the complications of that, and particularly the implications beyond technology. By anticipating all potential cyber-attack routes, and the human risks and ramifications, EY teams helped the electricity company look at the wider risks that could impact the benefits of smart meters. The company is now in the process of implementing new people policies, security processes and technical controls to make certain that smart meters not only protect, but power a data-centric future that consumers and organizations alike can trust.

EY Cybersecurity enables trust in systems, design and data, so organizations can take more risk, make transformational change and enable innovation with confidence.


Cybersecurity Compliance | Hot Credit Union Compliance Topics

Cybersecurity is a systemic risk that affects all levels of business, government and ordinary people. It is such a high risk area for credit unions that the National Credit Union Administration (NCUA) placed cybersecurity as a top focus for exams. As the cybersecurity world continues to evolve, it’s important that your credit union is prepared for possible threats. Be proactive and shield your credit union from the ever-changing cybersecurity universe now.

Below you’ll find credit union resources for cybersecurity compliance, including an interactive cybersecurity assessment tool, insightful blog posts, articles and webcasts, to help you stay on top of this evolving issue.

Resources marked by * are member-only. If you are not a NAFCU member, learn more about membership.

Charts & Guides

FFIEC Cybersecurity Workbook


NAFCU Compliance Blog Posts

Follow all Cybersecurity-related blog posts on The NAFCU Compliance Blog



Types of Cyber Security Degrees

Confused about cyber security degrees? We don’t blame you. That’s why we created this page. It’s intended to give you smart, simple advice for choosing a cyber security degree, including criteria you can use to compare schools. We also cover the current debate between cyber security vs. computer science and the sticky question of whether you need a degree.

Search for a Degree Program

If you’d prefer to search our listings for specific programs, here are your options:

What is a Cyber Security Degree?

A cyber security degree is intended to equip you with the knowledge and skills to defend computer operating systems, networks and data from cyber attacks. Although it incorporates theoretical concepts, it’s a technical degree.

Having this technical knowledge is key. Whether you are designing system architectures with certain security characteristics or detecting risks, threats and vulnerabilities, you are on the front line of defense.

Typical cyber security degree names include:

  • Cyber Security
  • Information Assurance
  • Information Security
  • Information Systems Security

All of these are regarded as sub-disciplines of computer science.

Is a Cyber Security Degree Worth it?

Not necessarily. The dearth of qualified info security professionals means anyone with great skills will probably be able to find a job. There are plenty of cyber experts with bachelor’s degrees in history/chemistry/physics/etc. or even no degree at all.

Nevertheless, the demand for candidates with solid technical degrees continues to grow:

General rule of thumb – if you want to advance to management-level positions, you may need to invest in more education.

What Universities Are Offering

Since cyber security is a relatively new field, universities are scrambling to put together undergraduate and graduate degree programs.

What’s more, as technology continues to evolve, so does the syllabus. Courses currently cover a wide swath of IT security and information assurance topics.

That means you’ll find a lot of variation between cyber security programs. Some schools choose to drill you in programming and discrete probability; others play up digital forensics and security policy. Cyber security is a young discipline, and schools are still establishing which approach is most effective.

How to Choose a Degree Program

So how do you go about choosing a program? Most importantly, you want an interdisciplinary degree that’s going to provide you with solid computing skills – fundamentals like programming, statistics, system administration, etc.

We’ve found it helpful to match course syllabi against the NSA’s CAE IA/CD (Centers of Academic Excellence in Information Assurance/Cyber Defense) academic criteria.

NSA CAE IA/CD Academic Criteria

According to the NSA’s 2014 Academic Criteria, a technical two-year program should include the following core knowledge units (KUs):

1.1 Basic Data Analysis
1.2. Basic Scripting or Introductory Programming
1.3. Cyber Defense
1.4. Cyber Threats
1.5. Fundamental Security Design Principles
1.6. Information Assurance Fundamentals
1.7. Intro to Cryptography
1.8. IT Systems Components
1.9. Networking Concepts
1.10. Policy, Legal, Ethics, and Compliance
1.11. System Administration

A four-year program (e.g. BS in Cyber Security) should include all of the above KUs and:

2.1. Databases
2.2. Network Defense
2.3. Networking Technology and Protocols
2.4. Operating Systems Concepts
2.5. Probability and Statistics
2.6. Programming

These are the basics. In advanced classes, you may be introduced to topics such as cloud computing, forensic accounting, wireless sensor networks and more.

Whatever area you’re interested in, look for courses that give you a lot of hands-on experience with real world problems.

View a list of CAE IA/CD schools.

What Else to Look for in a Cyber Degree Program

We know you’re going to have specific criteria for choosing a degree program (cost/geography/commute etc.) that bear no relation to the professors or the syllabus.

But, to give you bang for your buck, we wanted to point out how a couple of institutions are evaluating the worth of a cyber security degree. You may wish to use these ideas when you’re deciding between schools.

NSA CAE IA/CD Designation

In addition to core knowledge units (see above), the NSA also insists that a program:

  • Demonstrates outreach and collaboration
  • Has a center for IA/CD education
  • Fosters a robust and active IA/CD academic program
  • Ensures IA/CD is a multidisciplinary science within the institution
  • Supports the practice of IA/CD throughout the institution
  • Encourages student and faculty IA/CD research

Ponemon Institute

In its report, 2014 Best Schools for Cybersecurity, the Ponemon Institute found 10 characteristics that set the best schools apart:

  • Designated by the NSA and DHS as a CAE IA/CD institution.
  • Interdisciplinary program that cuts across different, but related fields – especially computer science, engineering and management.
  • Curriculum addresses both technical and theoretical issues in cyber security.
  • Courses on management, information security policy and other related topics essential to the effective governance of secure information systems.
  • Faculty composed of leading practitioners and researchers in the field of cyber security and information assurance.
  • Hands-on learning environment where students and faculty work together on projects that address real life cyber security threats.
  • Both undergraduate and graduate degree programs are offered.
  • Emphasis on career and professional advancement.
  • Graduates of programs are placed in private and public sector positions.
  • A diverse student body, offering educational opportunities to women and members of the military.

Note the insistence on interdisciplinary studies. Cyber security cuts across a lot of fields, including management, law and ethics. A strong degree is going to prepare you for issues you’ll be discussing with non-technical colleagues.

BS in Cyber Security vs. BS in Computer Science

Looking at bachelor’s degrees? Let us introduce you to the cyber security vs. computer science (CS) debate.

Thanks to a drought in qualified IT professionals, specialized degrees in cyber security have flooded the market. The NSA has even designated a number of 4-year programs as CAE IA/CD.

But is this a good thing? In his well-argued opinion piece for Computerworld, Ira Winkler notes that no other computing discipline (e.g. software engineering, systems administration, etc.) has a specialized degree program.

He’s especially unhappy that cyber security degrees aren’t giving undergraduates the experience that they’re going to need when they hit the job market:

“Take a look at the NSA’s cybersecurity professional development program. It wants people with strong programming skills. But many cybersecurity undergraduate programs do not offer any programming coursework. It’s been cut out to make room for more classes in things like writing security policies.”

By specializing so quickly (i.e. before graduate school), Winkler says, students are limiting themselves to a small subset of jobs.

Options for Undergraduate Degrees

Winkler may be right. But that doesn’t mean you should completely discount a Bachelor of Science in Cyber Security. Instead, think long and hard about your goals.

Option 1: BS in Cyber Security

If you’re determined to specialize in cyber security early:

  • Make sure your undergraduate program grounds you in critical math, engineering and programming skills.
  • Work hard to gain an intricate knowledge of the way operating systems are designed and built.
  • Join a local security group like ISSA, ISC2, ISACA or B-Sides.
  • Find a part-time job that both exercises and broadens your skills.

Remember that the degree itself is not going to be enough for potential employers. They will want to see evidence of real world experience.

Option 2: BS in Computer Science

Your second option is to stick with a Bachelor of Science in Computer Science (or IT, Electrical Engineering, Math, etc.) and supplement that technical degree with:

In this way, you retain a lot of flexibility, but you also show future employers that you’re serious about a cyber security career path.

Overview of Online Cyber Security Degrees

In an Online Cyber Security Degree, a large part of the work takes place in a virtual environment. Classes are delivered via the web and most assignments are completed remotely. Nevertheless, a good online program will have the same curriculum as a bricks and mortar degree.

IT subjects are well-suited to virtual learning, and online cyber security programs have been proliferating like rabbits.

Recognized public and private universities now offer:

However, online Online Cyber Security PhD Degrees and Online Cyber Security Associate Degrees are still fairly limited.

If you’re on the fence about online learning, you can always “try before you buy”. Universities have developed free online courses (MOOCs) that will give you a feel for the experience.

If you’re looking for the best online programs, consider our rankings of the:

Online Cyber Security Degree Format

Most schools require students to have a few basic tools:

  • Internet connection
  • Computer
  • Web browser
  • Communication/classroom software (e.g. Skype, Blackboard, WebCT, etc.).

One thing to keep in mind – since cyber security degrees are highly technical, you may need to invest in extra hardware/software (e.g. VMWare, virtual machines, etc.). This requirements should be listed on the school’s website. Talk to the Admissions office if you have any questions.


With self-paced programs (a.k.a. asynchronous learning), you have control of the schedule. Readings, assignments, tests and projects can be done on your own time. Lectures may be prerecorded, allowing you to access them whenever you wish. To encourage interaction, a lot of programs include discussion boards, wikis and social networking tools. This is the most common online degree format.


Real-time classes (a.k.a. synchronous learning) are much like traditional courses, only in a virtual environment. Everyone in the class must be online at the same time. The professor delivers the lecture or presentation; you discuss the work via real-time chat, audio or video conferencing. Some programs even have virtual worlds where you can meet and talk to fellow students.


Instead of choosing one format or the other, some schools have opted for a hybrid program. They might mix real-time online classes with prerecorded lectures. Or they may require you to attend orientation or introductory classes on campus.

Again, if you have any concerns, talk to the Admissions office. They will be able to answer specific questions about the format.

Online Cyber Security Degree: Pros & Cons

Benefits of an Online Cyber Security Degree

There are many reasons you might want to consider an online degree:

  • Reduced costs – e.g. commuting & childcare
  • Self-paced learning – you choose how much work you need to put in
  • Work from home – yes, in your pajamas
  • Flexible scheduling – online courses are ideal for working professionals
  • Better concentration – no more classroom distractions
  • Quality interaction – introverts may prefer live chats/email over face-to-face discussions
  • Career advancement – completing an online master’s degree or certificate will improve your job prospects

Risks of an Online Cyber Security Degree

On the other hand, you should also keep in mind the following:

  • Isolation – social learners may find the lack of face-to-face interaction discouraging
  • Time commitment – reading and comprehending coursework can suck up a lot of hours
  • Lack of oversight – you (and you alone) are responsible for making deadlines
  • Technological challenges – bricks and mortar schools have IT labs with dedicated technicians; you don’t
  • Limited instructor access – you will have to substitute virtual office hours and email for in-person conversations

How to Choose an Online Cyber Security Program


This is important. Online cyber security degrees are gaining in prestige, but you don’t want to get stuck with one that employers won’t respect.

Look for:

  • Regional Accreditation – e.g. New England Association of Schools and Colleges. Regionally accredited higher education schools are typically non-profit or state-owned institutions.
  • ABET Accreditation – the Accreditation Board for Engineering and Technology accredits post-secondary education programs in applied science, computing, engineering and engineering technology.
  • CNSS Training Standards – the Committee on National Security Systems has developed a set of standards for security professionals. Schools will often state that individual cyber security courses meet these standards.

Avoid for-profit, diploma mills that seek to fool you with phony accreditation.

Certification Compatibility

At some point in your career, you will probably be seeking professional certification (e.g. CompTIA Security+, CISSP, etc.). Some of these certifications have specific education requirements.

So before you commit to an online program, do your research:

  • Does your program prepare you for certification exams?
  • Will your online qualification be accepted by the accreditation body (e.g. ISACA)?

If you have any doubts, contact the accreditation organization and ask.

Hands-On Learning

To become an expert in your craft, you’ll need plenty of practical, hands-on opportunities to:

  • Experiment with security methods
  • Practice fighting simulated cyber attacks
  • Make mistakes that won’t cripple a real institution

Seek out online programs that provide virtual labs, fieldwork and self-directed projects.

Quality Faculty

Do your instructors really know their stuff? The field of cyber security is morphing so rapidly that it can be hard for some professors to keep up.

When you’re reading over faculty bios, see if they:

  • Continue to work in the field (e.g. a Department of Defense contractor, a corporate Security Consultant, a member of a major research project, etc.)
  • Have a strong education/employment track record
  • Publish research work in peer-reviewed journals
  • Develop projects to help students hone their skills
  • Belong to/serve on the board of independent organizations (e.g. IEEE)
  • Have received awards, recognitions and grant funding

Teachers can make or break an online degree program.

Internships/Work Experience

Internships and real-life work experience will give you a decided advantage heading into the job market.

Wherever you may live, good online programs will find ways to connect you with:

  • Government agencies
  • Non-profit organizations
  • Private companies

Some of this work experience may be able to be done remotely.

Resources & Support Services

Completing an online degree program is a challenge. Your school should be fully prepared to support you throughout the experience.

That means providing access to:

  • Virtual libraries and training resources
  • Online help and advice
  • Personal and professional counselors
  • Job placement services

You’re paying a lot for this qualification. You deserve to get bang for your buck.


eMajor: Bachelor of Science in Cybersecurity – Cyber Institute

eMajor is a degree completion partnership with University System of Georgia’s eCampus initiative. The B.S. in Cybersecurity is a new, completely online Kennesaw State University degree offering major-level courses at the eMajor discounted tuition rate of $199 per credit hour. This eMajor program is an affordable and high-demand post-secondary degree that addresses the workplace and cybersecurity needs of Georgia and beyond.

eMajor programs are ideal not only for traditional students who wish to take advantage of online course delivery, but also for working professionals, military members, transfer students, and others seeking alternative routes to degree completion.

For more information on Tuition and Fees, please see the Bursar’s Office Website.

25 Affordable BadgeRanked 1 Cyber Badge

Program Information

The Bachelor of Science in Cybersecurity program leverages current faculty capabilities in KSU’s existing Bachelor of Business Administration in Information Security and Assurance (BBA-ISA), the Bachelor of Science in Information Technology, and the Bachelor of Science in Criminal Justice. Compared to the current BBA-ISA degree’s more managerial-focused curriculum, the BS in Cybersecurity will deliver a more technically-focused, security-related degree designed to specifically address the fast growing cybersecurity sector.

The interdisciplinary nature of the BS in Cybersecurity program allows potential students to develop deep technological skills; an understanding of the business, managerial and administrative elements of cybersecurity; and an awareness of cybercrime issues.

Completing the eMajor in Cybersecurity will automatically earn students a minor in Information Technology. Two additional minors in Criminal Justice and Crisis Preparedness are also available.

Both the eMajor program and additional minors will be offered completely online, allowing students the convenience and flexibility to take courses from where they want, when they want.

For more information about this program, please contact:


Cybersecurity | ASU Students | ASU

The challenge universities face when preparing students for successful careers in cybersecurity is going beyond teaching just tactical, near-term solutions. Instead, we must provide an interdisciplinary education that takes into account critical skills, the understanding of risk and governance, and the importance of work-study experience that addresses cybersecurity from many angles.These elements are woven throughout various programs at ASU, and prepare cyber-aware individuals who will thrive in a variety of situations.

Kim Jones
Director of Cybersecurity Education Consortium, Professor of Practice Retired CISO


Cyber Security Careers and What You’ll Do on the Job

Although the increase in cyber attacks isn’t good news for any of us, there is a silver lining:

There has never been a better time to consider a cyber security career.

Cyber security professionals, or information security analysts, have a wide range of responsibilities, but the crux of their job is to protect online data form being compromised. As more of our personal information is stored online, the more important it becomes to step up security.

Cyber security careers are complex and many roles can be found with banks, retailers and government organizations. On the job, you can expect to safeguard an organization’s files and network, install firewalls, create security plans and monitor activity. If a breach occurs, you’ll be responsible for identifying the problem and finding a solution quickly.

Because of the frequency of cyber attacks, careers are varied and qualified professionals are in demand.

If you’re ready to get started in this fast-growing career, start exploring cyber careers now.

Here’s what our cyber security career pages will teach you

We’re experts in our field and we want you to become an expert in yours. There are many subtle variations in cyber security careers, even though they all may have the same end goal of keeping data and sensitive information safe. Our career pages can help you distinguish the differences and choose the right area of expertise to fit your skills and personality.

Before you embark on your education you’ll want to know what’s in store for your future. That includes not only what your educational journey will entail, but what the actual cyber security career you choose will really be like.


Here is the kind of important information you’ll find

What degree or certification will you need:
Should you earn your bachelor’s degree or can you get a job with a certificate? Will earning a bachelor’s help you climb the career ladder faster?

What interpersonal skills can help you on the job:
Having certain traits and skills before you start your career can actually help you. Learn what you can cultivate personally to help you succeed.

What will your job responsibilities be:
What will you really do on a day-to-day basis?

Salaries and job growth data:
How much can you earn and what job availability is anticipated in your cyber security specialty over the next decade?

Step-by-step guide to becoming a specialist in your chosen cyber security career.

Where can you work?
The answer to this question might surprise you.

Career options:
You might just be getting started in your career but where do you see yourself in five years’ time? Learn what paths are available.

Our career pages also offer resources and tips to help you make the most of your educational journey.
You’ll learn about a different kind of networking than computer networking and the importance of having a peer group or mentor, and understand what resources are available at your school to help you with everything from resume building to job searches.

So, if you’re ready to explore your cyber security education and career options, all you need to do is click a career tile and see where you can go.


Cybersecurity Jobs – Apply Now

More Than 5,000 Jobs Found

Save Search

Sort by:





Because of the Commute Filter, your results are limited. If you would like to see more jobs, remove the commute filter.

Remove Commute Filter 4566b56c5cd8b2322bd2cefa0e025699

11 days ago


Kforce Technology Jersey City, NJ Contractor

Kforce has a client in search of a Cybersecurity in Jersey City, NJ.

Can you picture yourself working for one of -America’s Ideal Employers-? Our client has received numerous awards and accolade…

Easy Apply


19 days ago

Cybersecurity Program Manager

Beacon Hill Staffing Group, LLC Addison Full Time

As the Cybersecurity Program Manager, your primary responsibilities will be to lead and manage large programs and projects within the cybersecurity organization and to maintain the portfolio of pro…

$115,000 – $125,000 / year

Easy Apply


6 days ago

Sr. Consulant to Sr Manager, Cybersecurity jhcswp1206

CultureFit Technology Staffing Chicago, IL Full Time

These roles (all levels) will likely interface with multiple groups, which could include external parties (e.g., law firms, insurance brokers and underwriters, media / public relations), internal r…

$100,000 – $200,000 / year

Easy Apply


11 days ago

Cybersecurity Advocacy Director

DTCC New York, NY Full Time

Are you ready to explore a world of possibilities? Join our DTCC family, and you’ll grow your expertise and become the best version of you. As you embark on a new journey, you’ll tackle challenges …


14 days ago

CyberSecurity Lead

Leidos Bethesda, MD Full Time

Technical Security: Develop and maintain policy in accordance with customer guidance and direction. Analyze and provide actionable feedback on Community, Enterprise, and Cybersecurity related polic…


12 days ago

Cybersecurity Program Manager

IDR Addison, TX Full Time

IDR is searing for a Cybersecurity Program Manager for their top client in the healthcare industry! This person will be handling several different Cybersecurity projects within Application Security…

Easy Apply


10 days ago

Cyber Security Manager

Advantage Resourcing Lake Angelus, MI Full Time

The mission of the CyberSecurity Regional Leader is to ensure a local representation of the entire CyberSecurity team in the country, capture the local specificities and constraints (eg: local appl…


9 days ago

Sr. Cyber Security Manager

The Judge Group Remote, OR Full Time

Our client is currently seeking a Sr. Cyber Security Manager that can sit in multiple locations including, Washington DC, Princeton, NJ, Chicago, Philadelphia, Nashville, and Atlanta. For immediate…

Easy Apply


25 days ago

Senior Cybersecurity Analyst – Team Lead – Senior Leader

ECS Federal, LLC Fairfax County Full Time

The role of a Senior Cybersecurity Analyst – Team Lead – Senior Leader will support ECS’s Enterprise Managed Cybersecurity Service Practice and internal Cybersecurity program. You are the definitiv…

Easy Apply


19 days ago

Manager- Cybersecurity

Robert Half Dallas, TX Full Time

-Advanced project management and status reporting capabilities Education & Experience: -Bachelor’s degree in a relevant discipline (e.g. MIS, CIS) required -5+ years in a related field, prefera…

Easy Apply


6 days ago

Cyber Security Manager

HealthAxis Group Tampa, FL Full Time

Health Axis Group, a leader in healthcare technology, is searching for a Cyber Security Manager to join our IT team. The Cyber Security Manager provides technical leadership in the monitoring, repo…

Easy Apply


2 days ago

Director of Information Security

Health & Hospital Corp Marion County Indianapolis, IN Full Time

The Director of Information Security is responsible for establishing and maintaining the information security program to ensure that information assets and associated technology, applications, syst…


24 days ago

Director – Information Security Officer

Johnson Controls Milwaukee, WI Full Time

The candidate will be able to articulate thoughts clearly, plan initiatives, and execute with appropriate urgency. The candidate will demonstrate drive, intelligence, maturity, and energy and will …



Information Systems Security Manager

Robert Half New Brunswick, NJ Seasonal / Temp

The Information Systems Security Manager (ISSM) is expected to promote, provide support, and lead the client’s Information Security Program and outreach initiatives The ISSM will assist and serve a…

Easy Apply


10 days ago

Information Systems Security Manager

General Dynamics Information Technology Fort Meade, MD Full Time

General Dynamic Information Technology (GDIT) has an opportunity for an Information Systems Security Manager working within the Defense Division, supporting an exciting new DoD program at Fort Mead…


7 days ago

IT Manager

PAE Kapolei, HI Full Time

PAE is proud to be an Equal Opportunity Employer. Our hiring practices provide equal opportunity for employment without regard to race, religion, color, sex, gender, national origin, age, United St…


12 days ago

Chief Information Security Officer

Inspire Recruitment boston Full Time

The CISO will identify vulnerabilities in information systems, network / systems architecture, network / system design implementations and work with responsible personnel to close or mitigate the v…


6 days ago

Information Systems Security Manager (ISSM): Tyndall Aerial Targets

PAE Tyndall Air Force Base, FL Full Time

ISSM is responsible for gathering information necessary to maintain security and establish functioning external barriers such as firewalls, Cross Domain Solutions and other security measures. ISSM …


12 days ago

IT Security Manager

Kforce Technology Fort Lauderdale, FL Full Time

Kforce has a client seeking an IT Security Manager in Fort Lauderdale, Florida (FL).

Initiate, develop, and maintain information security policies and procedures
Ensure se…

$115,000 / year

Easy Apply


20 days ago

Director, IT Security Operations

TeamHealth Knoxville, Tennessee, US Full Time

The Director of Security Operations will be responsible for information security operations, delivery, and architecture. Information security operations include vulnerability and threat management,…

Easy Apply



Manager, Information Security

HuntSource Chicago, IL Full Time

The Manager of Information Security will collaborate with the leadership team, within a highly matrixed capacity to understand their Security priorities to create a Security strategy, vision, roadm…

Easy Apply


24 days ago

Network Security Manager

Lowe’s Home Improvement Mooresville, NC Full Time

The primary purpose of this role is to manage the technical aspects of developing and modifying security infrastructure solutions within various computing environments. In addition, this role provi…


6 days ago

Technical Knowledge Manager

Unisys Corporation Augusta, GA Full Time

Unisys is a global information technology company that solves complex IT challenges at the intersection of modern and mission critical. We work with many of the world’s largest companies and govern…


6 days ago

IT Support Manager

Unisys Corporation Washington, DC Full Time

We are currently seeking a motivated, career and customer oriented IT Support Manager to join our team in Washington, DC to begin an exciting and challenging career with Unisys Federal Systems. Dut…


22 days ago

Manager Information Security

Community Foundation of Northwest Indiana, Inc Hammond, IN Full Time

The Information Security Manager will create and execute strategies which will improve the security of the organization, perform audits and scans to ensure systems are secure or to identify vulnera…

” data-remote=”true” href=”″>Load 25 More Jobs

Related Searches:


definition of cybersecurity by The Free Dictionary

Demonstrating conformance to these standards will allow manufacturers to provide objective evidence that their products comply with the FDA’s



Dhahran, Saudi Arabia:


is a worldwide phenomenon that represents a complicated challenge wherever technology is used.

16 (ANI): As cyber threats to the industry continue to evolve in complexity and intensity, emerging technologies such as permissioned blockchains can contribute to the important goals of combating


risks and adequately protect consumers’ financial information and the integrity of the global financial system, tech giant Microsoft said on Friday.

BANKING AND CREDIT NEWS-March 12, 2018-Trident Capital


hires chief financial officer


is a team sport that requires Program Management, Cyber/Information Technology, Engineering, Test and Evaluation, Finance, Logisticians and Contracting.

ENPNewswire-August 29, 2019–ABA-FFIEC Statement Supports Industry-Developed



M2 PRESSWIRE-August 7, 2019-: 2019 Report:


in Financial Services, Featuring 5 Case Studies of Successful Implementations

by Times News Service The Advanced


Academy delivered nine courses during the first half of 2019 to trainees from 40 government agencies.

Palo Alto Networks has come out with new research conducted with YouGov that shows 33% of UAE residents online prefer Artificial Intelligence (AI) to look after their


– a higher percentage than Europe.

Summary: UAE residents online (33 percent) prefer artificial intelligence (AI) to look after their


, according to a recent study conducted with YouGov and Palo Alto Networks.

Summary: TRA to implement new National


Strategy across nine sectors