Find The Best Information Assurance Jobs For You

Where do you want to work?

0 selections

Top Information Assurance Skills

Below we've compiled a list of the most important skills for an Information Assurance. We ranked the top skills based on the percentage of Information Assurance resumes they appeared on. For example, 19.5% of Information Assurance resumes contained Information Technology as a skill. Let's find out what skills an Information Assurance actually needs in order to be successful in the workplace.

The six most common skills found on Information Assurance resumes in 2020. Read below to see the full list.

1. Information Technology

high Demand
Here's how Information Technology is used in Information Assurance jobs:
  • Implemented end user security awareness training programs, testing the knowledge of security compliance in relation to areas of information technology.
  • Established and managed an enterprise-wide information technology programs which ensured securing member information against both internal and external data loss.
  • Analyzed and configured information technology systems to ensure availability and security of information system to support over 2000 daily transitions.
  • Assisted the FDA by focusing on effectively integrating and aligning information security processes with FDA business and information technology goals.
  • Used encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research.
  • Provided weekly briefings to Lockheed Martin/NASA senior executives on department task and accomplishments during joint Information Technology Conferences.

Show More

2. DOD

high Demand
Here's how DOD is used in Information Assurance jobs:
  • Provided network and system security as part of an information assurance team supporting DoD education systems.
  • Led independent and objective evaluations and audits of security policy and DoDI 8500.2 controls implementation as prescribed by regulatory bodies.
  • Demonstrated network and physical security investigation procedural skills designed to provide information pertaining to physical threats to DoD property.
  • Prepared all security documentation mandated by a variety of DoD/DON regulations including development of the system security requirements.
  • Assisted the Management Information Systems department with security certification of Information Technology system / network by the DoD.
  • Researched and maintained familiarity with all DoD security requirements, including STIGS and best practices for system implementation.

Show More

3. Cyber

high Demand
Here's how Cyber is used in Information Assurance jobs:
  • Helped clients identify three lines of defenses for Cyber Security.
  • Provided advice and recommendations to management on protections against threats to cyberspace and communications infrastructures, based on assessments and analyses.
  • Provided expertise on identification, implementation, and prioritization of cyberspace operational requirements to meet new policies and directives.
  • Implemented CyberArk Identity Management for risk and privilege reporting and enforcement.
  • Served on Corporate Senior Leadership Team to develop corporate CyberDefense strategy.
  • Developed and distributed monthly Cyber-Security newsletters and training materials for internal employees and external government customers.

Show More

4. Security Requirements

high Demand
Here's how Security Requirements is used in Information Assurance jobs:
  • Developed organizational information system security requirements.
  • Validated system security requirements definition/analysis.
  • Developed, updated and maintained efficient agency-wide policies and procedures to ensure IT practices are compliant with government and security requirements.
  • Determined security controls effectiveness (i.e., controls implemented correctly, operating as intended, and meeting security requirements).
  • Performed security risk assessments, developed security risk mitigation recommendations and defined security requirements for systems, applications and networks.
  • Coordinated Security Requirements and consulted with system developers for 50 new applications - Main POC for Enterprise Security Architecture.

Show More

5. RMF

high Demand
Here's how RMF is used in Information Assurance jobs:
  • Developed policies and procedures to satisfy DIACAP/RMF accreditation requirements.
  • Provided assistance with Risk Management Framework (RMF) transition from DIACAP by performing security control testing, implementation and evaluation.
  • Led organization s Risk Management Framework (RMF)/JSIG transition project reducing authorization package cycle time by 75%.
  • Performed map and gap analysis on DIACAP IA Controls to NIST Security Controls for RMF transition.
  • Provided assistance in re-accreditation of DoN Systems in accordance with DIACAP prior to RMF implementation.
  • Conducted DIACAP/RMF technical assessments at the Brigade and Battalion level utilizing the SCAP and ACAS.

Show More

Job type you want
Full Time
Part Time
Internship
Temporary

6. Nist

high Demand
Here's how Nist is used in Information Assurance jobs:
  • Worked with local programmers and Network General staff to have InfiniStream full packet capture capability from ArcSight console providing forensics capability.
  • Performed independent verification and validation on information systems for the National Aeronautics and Space Administration (NASA).
  • Created software tools as required to automate system administration processes.
  • Administered training for appropriate use of portable electronics devices.
  • Developed & administered enterprise wide security awareness training.
  • Administered Flying Squirrel software to identify unauthorized wireless access points within the National Guard.

Show More

7. Windows

high Demand
Here's how Windows is used in Information Assurance jobs:
  • Coordinated Windows vulnerability remediation efforts.
  • Performed accreditation and certification testing on Microsoft Windows-based systems, executed security test plans, and reported on testing results.
  • Worked with Windows and UNIX network administration teams to complete vulnerability and patch management assessments and implementation releases.
  • Reconstructed two Windows 2003 server using RAID technology for demonstration purposes in a classroom environment
  • Provided forensic analysis of Windows system using BackTrack to ensure Confidential Information was protected.
  • Deployed with Windows NT based telecommunications monitoring systems to conduct telecommunications security assessments.

Show More

8. Acas

high Demand
Here's how Acas is used in Information Assurance jobs:
  • Served as primary on the ACAS tool and analyzed scans to determine risk.
  • Used automated security scanning tools (ACAS) to identify potential vulnerabilities.
  • Trained to use ACAS for scanning duties.
  • Provided ACAS System Administration, and management for the AFJWICS Western Conus ESC.

Show More

9. Vulnerability Assessments

high Demand
Here's how Vulnerability Assessments is used in Information Assurance jobs:
  • Performed vulnerability assessments with validation via external/internal vulnerability scans.
  • Conducted network vulnerability assessments using tools to evaluate attack vectors, identified system vulnerabilities and developed remediation plans and security procedures.
  • Contributed to improving the Security Assessment process, which is used to perform Security Risk Assessments, Vulnerability Assessments and Security Reviews
  • Performed vulnerability assessments on internal and external systems, analyzed results and worked with business owners to resolve critical issues.
  • Performed periodic vulnerability assessments of the environment to identify weaknesses that may exist by utilizing various scanning tools.
  • Provided oversight and review of technical documents to include network diagrams, evaluations, and vulnerability assessments.

Show More

10. POA

high Demand
Here's how POA is used in Information Assurance jobs:
  • Worked in preparing of SIP, DIP, Score Card and POA&M documents (spread sheet).
  • Prepared and managed POAMS and vulnerability management reports from system audits and vulnerability assessments for risk management.
  • Assisted Team Leads and engineers with creating, validating and tracking Plan of Action and Milestones (POA&M).
  • Developed and updated system security plan (SSP), plan of action and milestone (POA&M).
  • Facilitated monthly POA&M meetings with CBP officials to develop strategies for implementing policies to mitigate potential risk.
  • Developed Plan of Action and Milestone (POA&M) to ensure that adequate controls are implemented.

Show More

Jobs With Trending Skills

11. Ensure Compliance

high Demand
Here's how Ensure Compliance is used in Information Assurance jobs:
  • Performed Information Assurance Awareness program staff assistance visits to ensure compliance with Air Force standards and regulations.
  • Reviewed client and vendor contracts and service agreements to ensure compliance with federal banking and information security regulations.
  • Collaborated with Human Resources to ensure compliance of regulatory policies and the protection of personal and sensitive information.
  • Applied necessary security patches to ensure compliance and provide information to follow policy and procedures within the organization.
  • Designed security education and awareness programs, and carried out inspections to ensure compliance with government directives.
  • Created documentation to ensure compliance for management, operational and technical security policies based on National Institute of Standards and Technology.

Show More

12. Isso

average Demand
Here's how Isso is used in Information Assurance jobs:
  • Worked with IS auditor and ISSO to remediate all identified security vulnerability detected.
  • Analyzed reports from CSAM, as specified by FISMA to support ISSO and the agency's assessment and authorization reporting requirements.
  • Worked with System Owner and ISSO to mitigate system vulnerabilities discovered during the security assessment.
  • Generated bi-weekly status reports for NCCIH's CIO and ISSO.
  • Represented the ISSO at DHS Component Level ISSO meetings and drafted mandates of findings.
  • Conducted annual assessment, updated existing Artifacts and worked with ISSO to secure information systems.

Show More

13. ATO

average Demand
Here's how ATO is used in Information Assurance jobs:
  • Managed filters on the firewall daily by tracking unauthorized IP address originators and blocking at the router.
  • Served as an Administrator for Online Compliance Reporting System.
  • Conducted data-driven analytics in order to deliver insight into client's business functions and compliance with regulatory standards.
  • Provided support to team members by helping resolve issues encountered during the release and HP Application Lifecycle Management Administrator.
  • Worked as the main facilitator for an EY internal training for CISA exam preparation IT Governance Domain.
  • Documented the Information Assurance process to be followed in later IATTs and ATOs.
  • Applied expertise in writing IATTs and ATOs for the directorate.

Show More

14. Defense Information

average Demand
Here's how Defense Information is used in Information Assurance jobs:
  • Submitted vulnerability assessment reports to Department of Defense Information Action Officers for approval.
  • Managed software patches sent by Defense Information Systems Agency and other Department of Navy approved third party vendors.
  • Supported the Lockheed Martin Corporation/Defense Information School at Fort Meade, MD.
  • Trained and led a team of junior technicians on operations and maintenance of Defense Information networks and equipment.
  • contracted to Defense Information Systems Agency Location: Fort Meade, MD.
  • Coordinated NMCI NIPRnet & SIPRnet circuit tracking with Defense Information Systems Agency (DISA).

Show More

15. Disa

average Demand
Here's how Disa is used in Information Assurance jobs:
  • Evaluated a disaster recovery plan to determine whether it enabled the recovery of IT processing capabilities in accordance with federal regulations.
  • Designed, developed and recommended integrated security system solutions to secure proprietary/confidential voice and data traffic in accordance to DISA regulations.
  • Improved the disaster recovery process of ICFS systems, enabling increased versatility in system redundancy through base-lining system images.
  • Conducted annual business continuity and disaster recovery exercises to evaluate the unit s ability to respond to a disaster.
  • Designed and reviewed Disaster Recover Procedures documentation and performed table exercises and recovery tests to assure police accuracy and validity.
  • Scanned and reviewed software to determine Net-worthiness, and made recommendations for approval/disapproval based on results.

Show More

16. Iava

average Demand
Here's how Iava is used in Information Assurance jobs:
  • Reviewed CID information systems and IAVA procedures relating to criminal activity/intelligence/ military IP intrusion detection analysis.
  • Coordinated with the System Center Configuration team with IAVA tracking, reporting and vulnerability mitigation.
  • Required to research IAVA and implement alternative when mitigation is unsuccessful.
  • Utilized skills to determine if requisite security patches and remediation procedures have been applied per IAVA requirements.
  • Maintained IAVA process for both DECGS and Prophet systems keeping systems compliant with Government mandates.
  • Developed an automated script to distribute update to streamline the distribution of IAVA policies.

Show More

17. Security Incidents

average Demand
Here's how Security Incidents is used in Information Assurance jobs:
  • Responded to security incidents and conducted investigations and forensics to ensure that data systems and confidential data were not breached.
  • Monitored and coordinated resolution of security incidents submitted from third party Security Operations Center (Dell SecureWork's).
  • Monitored security events at the network, application, and operating systems level to identify potential security incidents.
  • Developed intrusion analysis techniques and countermeasures based upon security intelligence data and drafted the security incidents reports.
  • Addressed information security incidents and utilized data collection tools as part of an investigation process for analysis.
  • Responded to IT security incidents directing inquiries, reporting incidents, implementing corrective actions and attending briefings.

Show More

18. Accreditation Process

average Demand
Here's how Accreditation Process is used in Information Assurance jobs:
  • Tracked the Certification and Accreditation process for communication and network systems for subordinate units.
  • Maintained existing SSAA documentation and provided documentation for new systems going through the accreditation process.
  • Managed and coordinated system certification and accreditation process for over 18 mission systems.
  • Participated in design reviews, technical exchange meetings, and Certification and Accreditation process.
  • Conducted risk and vulnerability assessments as part of the accreditation process.
  • Managed Risk Management Framework (RMF) accreditation process for the Joint Mission System's Service Pack 9.

Show More

19. Stig

average Demand
Here's how Stig is used in Information Assurance jobs:
  • Responded to information security breach incidents with thorough investigation and reporting.
  • Based on earlier recommendations, prepared sublevel items test matrices to comply with STIGs.
  • Co-authored "Blackberry Enterprise Server Hardening Using DISA STIGs.
  • Managed a 15-person team charged with implementing 80+ configurations and security upgrades utilizing Security Technical Implementation Guides (STIGS).
  • Performed investigations of Cross Domain Violations (CDV), incidents involving connecting classified systems into lower classification networks.
  • Developed Agency policy for conducting Computer Forensic investigations following industry standard practices and procedures in preserving digital evidence.

Show More

20. Information Security

average Demand
Here's how Information Security is used in Information Assurance jobs:
  • Revised hospital information security policy documentation.
  • Incorporated company's Information Security policies and procedures into concise, clear communications materials that increased awareness and decreased fraudulent activities.
  • Delivered regular reports to management describing the state and status of existing threats, vulnerabilities, and other information security metrics.
  • Coordinated and enforced compliance to corporate Information Security policies department briefing sessions, security education, and other methods as appropriate.
  • Correlated, analyzed, and escalated information security related events and alarms using security event management tools and following best practices.
  • Produced information security reports on vulnerabilities and fixes; developed standard operating procedures for TNOSC/RCERT-S operations, to include incident handling.

Show More

21. Computer System

average Demand
Here's how Computer System is used in Information Assurance jobs:
  • Performed comprehensive security analysis on computer system configurations including procedural and documentation assessments.
  • Worked closely with other agencies within organizations to perform detailed analysis for applications, networks, and computer systems.
  • Coordinated efforts involving Computer Systems Security Analyst system requirements, information collection, and drafting a requirements document.
  • Coordinated the implementation of computer systems plans with other stakeholders within the organization and with partners.
  • Validated security configurations were designed and implemented within NASA standards on all computer systems.
  • Conducted Vulnerability Assessments of Classified & Non-Classified computer systems on a bi-monthly basis.

Show More

22. ISO

average Demand
Here's how ISO is used in Information Assurance jobs:
  • Managed client compliance assessments and external assessments (ISO 27002 / PCI DSS).
  • Nominated and appointed by firm leadership to the People Advisory Committee.
  • Executed a cybersecurity program maturity assessment at a global food and beverage company (based on ISO 27001 and NIST frameworks)
  • Served as peer advisor to 3 other Tulsa staff members.
  • Created computer systems security processes, developed policies and procedures including ISO 9000 documentation, and ensured compliance to audit requirements.
  • Served as liaison between senior network firewall/DNS/PROXY engineers, and applications developers to resolve remote access network connectivity issues.

Show More

23. Disk

low Demand
Here's how Disk is used in Information Assurance jobs:
  • Led implementation for new DAR solution for global disk encryption, developing management policy to prevent document and data leakage.
  • Applied Gold Disk to all servers as part of transition and closed or mitigated all open vulnerabilities.
  • Created hardening standards for MED's (Mobile Electronic Devices) in Gold Disk standards.
  • Performed Quarterly Gold Disk Server Scans on entire NCHP Navy system.

Show More

24. IDS

low Demand
Here's how IDS is used in Information Assurance jobs:
  • Coordinated installation and trouble- shooting of USCENTAF's CISCO CSIDS deployed throughout the CENTCOM AOR.
  • Managed Network Traffic Analysis tool Solarwinds and HBSS Host Based Security System IDS.
  • Performed advanced anomaly detection and analysis of the internal/external DMZ environments utilizing IPS & IDS, and implemented corrective actions.
  • Worked closely with the Global Vulnerability Assessment team to coordinate penetration testing and vulnerability scans with NIDS alerts.
  • Developed customized shell scripts which automated daily processes and standardized procedures for maintenance and configuration of the IDS.
  • Performed user entitlement reviews; tracked and reported violations against established IDs.

Show More

25. System Security Plans

low Demand
Here's how System Security Plans is used in Information Assurance jobs:
  • Maintained and updated information system security documentation for 96 Center system security plans.
  • Researched, created, implemented Certification & Accreditation (C&A) and system security plans and reviews.
  • Assisted in the development and maintenance of system security plans and contingency plans for all systems under my responsibility.
  • Assisted in authoring, testing, certification and accreditation of system security plans.
  • Led efforts to convert 8 USCIS information System Security Plans (SSP) to NIST 800-53 Rev.
  • Reviewed system security plans, risk assessments, and compliance with NIST minimal security controls.

Show More

26. Unix

low Demand
Here's how Unix is used in Information Assurance jobs:
  • Monitored UNIX systems for deviations from established security policies.
  • Performed departmental technical writing; specifically UNIX documentation.
  • Analyzed all UNIX vulnerability findings detected by testing and recommend changes to correct all vulnerabilities.
  • Reviewed monthly Unix code updates/modifications prior to implementation.
  • Analyzed raw data to ensure no discrepancies were found with UNIX resource ownership or UNIX user groups or host groups.
  • Coordinated with clients locally and internationally to ensure proper ownership was delegated to UNIX user groups and host groups.

Show More

27. REV

low Demand
Here's how REV is used in Information Assurance jobs:
  • Reviewed Software Test Plan and provided recommendations to meet documentation requirement with corresponding security controls and also documenting test results.
  • Reviewed remediation plans developed by the audit entities to determine if control weaknesses have been appropriately addressed.
  • Received top level performance reviews on engagements.
  • Identified new user provisioning process during audit review at Wal-Mart headquarters, which captured significant time-savings and rave client reviews.
  • Reduced manual work by automating the daily task of reporting open trouble tickets for review and resolution.
  • Monitored preventive measures that preclude illegal destruction of computer assets, data files, hardware and programs.
  • Tailored identified security controls as stated in NIST 800-53 REV 4 to fit into the environment.
  • Performed testing on projects, which increased company revenues in the millions of dollars.
  • Drafted all seven report draft for the Senior Manager and Partners for review.
  • Provided formal, written performance reviews for staff on my teams.
  • Performed review of client Enterprise IT Risk Assessment process, engaging directors through chief officers to complete review efforts.

Show More

28. Business Continuity

low Demand
Here's how Business Continuity is used in Information Assurance jobs:
  • Provided mission assurance for implementation and systems integration while maintaining 100% business continuity.
  • Managed strategic enterprise business continuity management and disaster recovery programs.

Show More

29. Wsus

low Demand
Here's how Wsus is used in Information Assurance jobs:
  • Utilized Retina and QTIP Scanners to scan network; executed patches using GFI Languard and WSUS.

Show More

30. SOX

low Demand
Here's how SOX is used in Information Assurance jobs:
  • Performed year-end SOX testing for Insurance and Banking clients.
  • Tracked and assessed enterprise-wide systems and architectures, interviewing systems managers and internal auditors to determine operational and SOX functionality.
  • Performed RACF administrator verification and contractor validation process to ensure SOX compliance.
  • Presented monthly incident summary reports to Executive Management for SOX compliance.
  • Ensured organizational compliance with Sarbanes-Oxley (SOX) information security programs.
  • Provided requested documentation for related SOX internal and external audits.

Show More

31. ISS

low Demand
Here's how ISS is used in Information Assurance jobs:
  • Collected HUMINT using a variety of methods and disseminated strategic intelligence based on requirements set by superiors.
  • Collaborated with executive management at clients on remediation of issues.
  • Processed network scans weekly for possible vulnerabilities using Internet Security Scanner (ISS).
  • Liaised with vendors on IT related issues and ensures that SLA is adhered to.
  • Configured and resolved all Microsoft Office issue including office 365 for various users.
  • Identified mitigating controls for areas where issues were identified.
  • Notified users of compliance issues and managed accounts accordingly.
  • Collaborated with EY management in developing substantive testing approach where potentially significant issues were identified.
  • Escalated technical issues to the right groups when necessary Documented all requests in ticketing tracking tool (Vulcan).
  • Provided regular updates to CIOs on engagement status and issues identified.
  • Resolved all user's issues on accessing enterprise mobile applications on Blackberries, IPhone, IPad and Android.

Show More

32. Ditscap

low Demand
Here's how Ditscap is used in Information Assurance jobs:
  • Installed, integrated and guided STRATCOM's STARS system through DITSCAP accreditation

Show More

33. Internal Controls

low Demand
Here's how Internal Controls is used in Information Assurance jobs:
  • Performed top down mapping of Internal Controls and helped clients optimize the structure.

Show More

34. Infosec

low Demand
Here's how Infosec is used in Information Assurance jobs:
  • Served as a Senior Information Technology Specialist (INFOSEC) within the U.S. Army Pacific Theater of.

Show More

35. SQL

low Demand
Here's how SQL is used in Information Assurance jobs:
  • Employed MS Access & SQL to create a single tracking database to improve information accuracy & reduce report prep time.
  • Implemented system Policies and Profiles, moving content DB from old SQL Server to New SQL Server for the client.
  • Performed detailed security reviews of various web applications according to OWASP and NIST standards, including underlying Oracle SQL databases.
  • Monitored and troubleshot both local and domestic SQL Server databases and hosts keeping downtime and outages to a minimum.
  • Designed Database tables for the applications, created views, stored procedures, and triggers in SQL Server 2005.
  • Configured multiple Apache web, SQL and MySQL database servers and setup new system configuration and maintain database.

Show More

36. EY

low Demand
Here's how EY is used in Information Assurance jobs:
  • Performed Sarbanes-Oxley 404 testing focusing on IT application and general controls.

Show More

37. ST

low Demand
Here's how ST is used in Information Assurance jobs:
  • Monitored procedures governing authorization to the computers, personnel data, and distribution of all materials entering or leaving the facility.
  • Tested and evaluated firewall security software to guarantee auditing requirements met and/or exceeded customer s defined expectations.
  • Developed and maintained standard operating procedures to preserve continuity in the event of an emergency.
  • Managed relationships with business and IT stakeholders to create effective frameworks for audit executions.
  • Coached, developed, and supervised staff on engagement procedures and audit methodology.
  • Monitored 3,200 system users and 4,000+ computer workstations activities/auditing throughout the organization.
  • Managed business impact and strategic risk analyses for domestic and international operations.
  • Performed information system assessment and operational evaluation in Financial Services Industry.
  • Evaluated corporate policies and procedures for consistency and controlled deficiencies.
  • Provided security countermeasures hardware to secure network against intrusions.
  • Assessed the completeness and accuracy of the system-generated reports.
  • Supervised testing activities relied upon from Internal Audit.
  • Analyzed control exceptions and identified alternate audit strategy.
  • Learned the systematic methodology used by hackers in attacks as well as the defensive countermeasures that can be employed against them.
  • Created and implemented the GMD Information Systems Security Policy to govern users on appropriate use of the network and government computers.
  • Created directorate Plan of Action and Milestones (POA&M) resulting from Software and System Testing and Evaluations.
  • Sustained current system Certification and Accreditation (C&A) package approvals in an RDT&E infrastructure.
  • Developed with the assistance of client management streamlined control objectives and testing procedures to be leveraged across the corporation.
  • Established procedures for the privacy program and assisted in the security and accountability of data, systems and programs.
  • Performed security vulnerabilities on 100 - 150 NT workstations in Army and Air Force sites to spearhead processes.

Show More

38. Runtime Errors

low Demand
Here's how Runtime Errors is used in Information Assurance jobs:
  • Improved efficiency by 25% reducing runtime errors to zero through process automation.

Show More

20 Most Common Skill For An Information Assurance

Information Technology19.5%
DOD12.2%
Cyber10.8%
Security Requirements8.6%
RMF6.9%
Nist6%
Windows4.5%
Acas2.5%

Typical Skill-Sets Required For An Information Assurance

RankSkillPercentage of ResumesPercentage
1
1
Information Technology
Information Technology
19.5%
19.5%
2
2
DOD
DOD
12.2%
12.2%
3
3
Cyber
Cyber
10.8%
10.8%
4
4
Security Requirements
Security Requirements
8.6%
8.6%
5
5
RMF
RMF
6.9%
6.9%
6
6
Nist
Nist
6%
6%
7
7
Windows
Windows
4.5%
4.5%
8
8
Acas
Acas
2.5%
2.5%
9
9
Vulnerability Assessments
Vulnerability Assessments
2.4%
2.4%
10
10
POA
POA
2.3%
2.3%
11
11
Ensure Compliance
Ensure Compliance
2.2%
2.2%
12
12
Isso
Isso
2.1%
2.1%
13
13
ATO
ATO
1.9%
1.9%
14
14
Defense Information
Defense Information
1.7%
1.7%
15
15
Disa
Disa
1.7%
1.7%
16
16
Iava
Iava
1.5%
1.5%
17
17
Security Incidents
Security Incidents
1.5%
1.5%
18
18
Accreditation Process
Accreditation Process
1.5%
1.5%
19
19
Stig
Stig
1.5%
1.5%
20
20
Information Security
Information Security
1.5%
1.5%
21
21
Computer System
Computer System
1.4%
1.4%
22
22
ISO
ISO
0.7%
0.7%
23
23
Disk
Disk
0.7%
0.7%
24
24
IDS
IDS
0.6%
0.6%
25
25
System Security Plans
System Security Plans
0.6%
0.6%
26
26
Unix
Unix
0.5%
0.5%
27
27
REV
REV
0.4%
0.4%
28
28
Business Continuity
Business Continuity
0.4%
0.4%
29
29
Wsus
Wsus
0.4%
0.4%
30
30
SOX
SOX
0.3%
0.3%
31
31
ISS
ISS
0.3%
0.3%
32
32
Ditscap
Ditscap
0.2%
0.2%
33
33
Internal Controls
Internal Controls
0.1%
0.1%
34
34
Infosec
Infosec
0.1%
0.1%
35
35
SQL
SQL
0.1%
0.1%
36
36
EY
EY
0.1%
0.1%
37
37
ST
ST
0.1%
0.1%
38
38
Runtime Errors
Runtime Errors
0.1%
0.1%

26,594 Information Assurance Jobs

Where do you want to work?