- UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure the application and updates of the Food Safety & Food Security Certification standards and procedures. Liaison between internal operations, sales and customers related to any food safety, quality and food security inquires.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of cybersecurity principles, practices, and technologies, including network security, application security, encryption, and identity and access management (IAM.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
HL7 FHIR Competence: Exhibit an in-depth understanding of HL7 FHIR standards and their application to the exchange of healthcare data. As the US Government is our clientele, you may be required to obtain a public trust or security clearance.
$125,000 - $170,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency in automation and continuous delivery methods Proficient in all aspects of the Software Development Life Cycle Advanced understanding of agile methodologies such as CI/CD, Applicant Resiliency, and Security Hands-on practical experience delivering system design, application development, testing, and operational stability Preferred Qualifications, Capabilities, and Skills Exposure to cloud based platform like AWS , Azure, GCP. Exposure to go programming language.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data sources / architecture / application design and software testing practices as it relates to cyber threat intelligence, cyber fraud intelligence, cyber crime, or active defense.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information and application security including firewall, AD, TAM/PING, LDAP, certificates, public key encryption, SSH, access credentials, etc. DevOps/Application Support: Design scaling strategies and develops automation scripts and solutions Provide mentorship on build automation using Dockers & Containers, and Orchestration technologies like OpenShift / Kubernetes/EKS and Atlassian tool suite.
$154,000 - $230,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The position will also be responsible for the operational excellence of all Cx applications including contracts, Cx application helpdesk tickets, budgets, compliance, security, and SLAs. In this role, The Director of Applications Cx will collaborate closely with Cx business partners (Sales and Marketing), IT Teams, Strategy Development and Execution, Security, Technology and Enterprise Support.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information security (application security, network security, cyber security, data protection) Certifications related to or pursuing certification related to Cloud, Cyber or Technology Operations, such as Cloud provider certifications, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in data management, data governance, data protection, information governance, information security, database development or modeling, application development, systems analysis, data analytics, technology architecture, data architecture, business architecture, data science, or combination of transferable experience and education.
Full-timeRemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced Application Experience: HR, ITOM, CMDB, CSM, Security, ITAM, Asset Management (HAM/SAM), SPM, Platform/Integration, Portal/UI Builder, GRC. Minimum 5 Years' experience of experience in JavaScript or related application development.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Capital One is seeking an energetic, self-motivated Sr. Technology Manager with experience in technology, cyber and information security analysis interested in becoming part of our Audit team. At least 7 years of experience in information technology (operations, software delivery, access management, information security, cloud computing.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will provide leadership, hands-on management, and strategic direction for all IT-related areas, including digital transformation, infrastructure and data architecture, application development and support, networks, cybersecurity, telecommunications systems, out-sourced vendor relationships, desktop support, audio-visual, project management, and disaster recovery/business resumption.
$290,000 - $315,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
A current and active US DoD Security Clearance Preferred Qualifications: Top Secret or TS/SCI security clearance Experience in product development a plus (preferably in military application environment.
TemporaryExpandApply NowActive JobUpdated 3 days ago
application security jobs
FEATURED BLOG POSTS
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.