- Home
- »All Job Categories
- »Security Jobs
Auto-apply to these security jobs
We've scanned millions of jobs. Simply select your favorites, and we can fill out the applications for you.

Posted 30+ days ago

Posted 30+ days ago
Posted 3 days ago
Posted 6 days ago

Posted 3 days ago
Posted 2 weeks ago
Posted 2 weeks ago

Posted 30+ days ago
Posted 6 days ago
Posted 30+ days ago

Posted 2 weeks ago
Posted 2 weeks ago
Posted 3 days ago
Posted 2 days ago

Posted 6 days ago
Posted 1 week ago
Posted 4 weeks ago

Posted 30+ days ago

Posted 2 days ago

Posted 3 weeks ago

Security Control Assessor 3
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.1
Reclaim your time by letting our AI handle the grunt work of job searching.
We continuously scan millions of openings to find your top matches.

Job Description
Responsibilities
- Conduct verification and validation for security compliance of low and moderately complex information systems, products, and components.
- Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures.
- Provide identification of non-compliance with security requirements and mitigations to requirements that are not in compliance.
- Conduct on-site evaluations.
- Validate the security requirements of the information system.
- Verify and validate that the system meets the security requirements.
- Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system.
- Provide process improvement recommendations.
- Draft standards and guidelines for usage.
Minimum Qualifications
- Twelve (12) years of experience in security, systems engineering or system assessment, including recent experience within the last three (3) years in five (5) or more of the following areas: Cybersecurity principles and technology, including access/control, authorization, identification and authentication, PKI, network and enterprise security architecture is required.
- A Bachelor's degree in Computer Science, Information Technology Engineering, or a related field is required.
- A master's degree in Computer Science or Information Technology Engineering or a related field of study may be substituted for two (2) years of experience, reducing the requirement to ten (10) years of experience.
- An additional four (4) years of security or system engineering experience may be substituted for a bachelor's degree.
- Required Certifications (one or more): CASP+ CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, CCSP, CISM, CISSP (or Associate), GSLC, CCISO
Required Capabilities
- Analyze design specifications, design documentation, configuration practices and procedures, and operational practices and procedures
- Conduct on-site evaluations
- Conducts verification and validation for security compliance of low and moderately complex information systems, products, and components
- Provide identification of non-compliance with security requirements and mitigations to requirements that are not in compliance.
- Validate the security requirements of the information system
- Verify and validate the system meets the security requirements
- Provide vulnerability assessment of the system, coordinate penetration testing, and provide a comprehensive verification and validation report (certification report) for the information system
- Facilitate penetration testing
- Provide a comprehensive verification and validation report (certification report) for the information system.
Automate your job search with Sonara.
Submit 10x as many applications with less effort than one manual application.
