Student Veterans of America Jobs

Welcome to SVA’s jobs portal, your one-stop shop for finding the most up to date source of employment opportunities. We have partnered with the National Labor Exchange to provide you this information. You may be looking for part-time employment to supplement your income while you are in school. You might be looking for an internship to add experience to your resume. And you may be completing your training ready to start a new career. This site has all of those types of jobs.

Here are a few things you should know:
  • This site is mobile friendly. You do not need a log-in or password to access information.
  • Jobs on this site are original and unduplicated and come from three sources: the Federal government, state workforce agency job banks, and corporate career websites. All jobs are vetted to ensure there are no scams, training schemes, or phishing.
  • The site is refreshed daily to remove out-of-date content.
  • The newest jobs are listed first, so use the search features to match your interests. You can look for jobs in a specific geographical location, by title or keyword, or you can use the military crosswalk. You may want to do something different from your military career, but you undoubtedly have skills from that occupation that match to a civilian job.

Job Information

Credence Management Solutions LLC Information Systems Security Officer in Dayton, Ohio

Information Systems Security Officer Job Locations US-OH-WPAFB ID 2024-8039 Category Information Technology Type Regular Full-Time Overview Credence Management Solutions, LLC (Credence) is seeking an Information Systems Security Officer in support of the Cyber Resiliency Office for Weapon Systems (CROWS) at Wright-Patterson AFB, OH. Responsibilities Work within SAP and Sensitive Compartmented Information (SCI) facilities supporting CROWS' mission. Provide "day-to-day" support for Collateral, SCI and SAP activities, and support other classified network systems. Appraise and recommending assessment documentation and providing written recommendations for authorization to Government program managers. Perform oversight of the development, implementation and evaluation of information system security program policy; special emphasis placed upon integration of existing SAP network infrastructures. Verify authorizations are accomplished on each Automated Information System (AIS). Assist with risk assessments and make recommendations to customers. Periodically review system security to accommodate changes to policy or technology. Assist with the development and maintenance of the information systems security program. Ensure all personnel receive the necessary technical and security training for using AIS. Confirm proper protection or corrective measures undertaken when an incident or vulnerability is discovered within a system. Conduct assessment tests that include verification that the features and assurances required for each protection level are functional. Maintain a repository for all system authorization documentation and modifications. Coordinate AIS security inspections, tests, and reviews. Assist in developing policies and procedures for responding to security incidents, and for investigating and reporting security violations and incidents. Confirm data ownership and responsibilities are established for each AIS, to include accountability, access rights, and special handling requirements. Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local AIS security training. Ensure system security requirements are addressed during all phases of the system life cycle. Confirm security assessments and audits are completed and documented. Identify threats and vulnerabilities to ascertain whether additional safeguards are needed. Assess changes in the system, its environment, and operational needs that could affect the authorization. Review AIS assessment plans. Support necessary compliance activities. Conduct periodic assessments of the security posture of the AIS. Ensure Configuration Management (CM) for security-relevant AIS software, hardware, and firmware are properly documented. Validate AIS authorization documentation is current and accessible to properly authorized individuals. Participate in self-inspections, identifying security discrepancies, and reporting security incidents. Perform file transfers between local systems to storage devices. Design, review, endorse, and recommend actions by the system approving authority for system assessment documentation. Perform risk assessments and making recommendations to customers. Build and maintain the information systems security program. Coordinate and confirm proper protection or corrective measures were completed when an incident or vulnerability is discovered within a system. Ensure approved procedures are in place for clearing, purging, declassifying, and releasing system memory, media, and output. Conduct assessment tests that include verification that the features and assurances required for each protection level are functional. Build polic

DirectEmployers