Post job

7 jobs that use IAM the most

Jobs that use iam the most include information assurance officer, manager, information assurance, and information systems security manager.

What jobs use IAM the most?

1. Information Assurance Officer

How information assurance officer uses IAM:

  • Work directly with IAM to resolve network issues, manage audit records and ensure audit software conforms to specify guidelines.
  • Lead implementation for new DAR solution for global disk encryption, developing management policy to prevent document and data leakage.
  • Receive IAVA's and STIG vulnerabilities from VMS.

Most common skills for information assurance officer:

  • IAM
  • DOD
  • RMF
  • Security Policies
  • Security Procedures
  • Security Posture

2. Manager, Information Assurance

How manager, information assurance uses IAM:

  • Manage and monitors FISMA governance for all command accreditations.
  • Manage the provisioning of the hardware and software for virtual servers and personal computers.
  • Review and manage the security and information assurance capabilities of database applications, database structure and architecture.

Most common skills for manager, information assurance:

  • Risk Assessments
  • IAM
  • DOD
  • ACAS
  • NIST
  • RMF

3. Information Systems Security Manager

How information systems security manager uses IAM:

  • Upgrade and manage all manage & unmanage network switches and routers.
  • Manage the training and education program for the ISSO and user population.
  • Lead the HBSS enterprise upgrade effort for classify and unclassify networks to ensure DISA compliance.

Most common skills for information systems security manager:

  • RMF
  • IAM
  • DOD
  • ISSM
  • Windows
  • Security Posture

4. Information Assurance Analyst

How information assurance analyst uses IAM:

  • Log analysis & managing the accuracy of DLP identification to lowering/avoiding false positives and negatives.
  • Monitor, detect and report vulnerability issues using ACAS scanner.
  • Used automated security scanning tools (ACAS) to identify potential vulnerabilities.

Most common skills for information assurance analyst:

  • RMF
  • DOD
  • ACAS
  • IAM
  • Windows
  • Security Policies

5. Information Assurance Security Officer

How information assurance security officer uses IAM:

  • Implement a manage endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Maintain HBSS systems and ACAS on SIPRNET and NIPRNET networks.
  • Utilize Nessus/SCAP scans in conjunction with STiG documentation to adhere with DISA compliance for system submission for ATO.

Most common skills for information assurance security officer:

  • Security Procedures
  • DOD
  • ACAS
  • IAM
  • Security Policies
  • System Security

6. Information Assurance Engineer

How information assurance engineer uses IAM:

  • Install, configure, and managing ACAS deployments to assess the current vulnerabilities and security posture for classify networks.
  • Implement a manage endpoint encryption solution utilizing TrendMicro MobileArmor to secure university workstations against sensitive data loss.
  • Review system security plans, risk assessments, and compliance with NIST minimal security controls.

Most common skills for information assurance engineer:

  • RMF
  • DOD
  • IAM
  • Windows
  • ACAS
  • Assurance Support

7. Senior Information Assurance Engineer

How senior information assurance engineer uses IAM:

  • Review and manage the security and information assurance capabilities of database applications, database structure and architecture.
  • Provide engineering support for all MHS regions regarding up-to-date DISA STIG.
  • Support DoD clients with application and software architecture assessments, risk analysis, and vulnerability assessments.

Most common skills for senior information assurance engineer:

  • RMF
  • NIST
  • DOD
  • ACAS
  • IAM
  • Infrastructure

Other skills