- UpvoteDownvoteShare Job
- Suggest Revision
DescriptionHumana's Associate Vice President (AVP), Technology and Cybersecurity Risk works closely with all areas of Enterprise Information Protection (EIP), Internal Audit, Enterprise Risk Management, business units, regulator.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Designing and implementing new capabilities in support of Data de-identification, Unstructured File Analysis, Crown Jewel data protection and Global Workforce data protection, in alignment with enterprise security architecture Zero Trust principles.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As such, it requires someone who can bring the experience of leading a major enterprise successfully through such digital transformations as migration to cloud infrastructures, enabling and transitioning to microservices, efficiency and scale through automation and SRE practices, and setting the strategy and vision for modern data management and analytics.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years Tech sales experience (Cyber Security, Data Storage, Data Protection, IT Infrastructure, and/or SaaS) Enterprise Account Executive - Southeast- Our Enterprise Account Executive will lead the sales process within an assigned territory of business for net new Enterprise logos into prospective accounts.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Proficiency with enterprise-class storage and data protection technologies such as: storage and backup arrays, SAN switches, backup software, and storage replication technology. Design solutions, integrate, configure, test and deploy numerous types storage and data protection technologies from EMC, NetApp, Nutanix, and others.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security and Compliance: Ensure that the ERP system and associated databases adhere to security and compliance standards, including data protection and privacy regulations. The Prophet 21 Programmer and SQL Specialist is responsible for developing and maintaining software applications within the Prophet 21 Enterprise Resource Planning (ERP) system, with a strong focus on utilizing SQL for database management and reporting.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We seek to address some of our country's most pressing challenges in the areas of Agile application development, Enterprise Data Management, Enterprise Architecture, and Program Management support services - focusing on the U.S. Departments of Homeland Security and Treasury.
RemoteExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The RedHat Engineer III is responsible for maintaining the Unix and Linux infrastructure to ensure the highest levels of availability, reliability, and data protection. 5 Years Relevant work experience to include experience working with IBM AIX and/or RedHat Enterprise Linux, shell scripting, and hardware management with a Bachelor's degree (Required) Or.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role, The Azure Security SME will develop software and recommend security controls and threat protection, managing identity and access management, defining organizational structure and policies, in Azure technologies to provide data protection, configuring network security defenses, collecting and analyzing Azure logs.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement and maintain Security tools and platforms such as Network Data Loss Prevention, Cloud Access Security Broker, Privileged Access, Identity Access Management, file and removable media protection tools, and Security Awareness Training portals.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of design and implementation of cloud networking, enterprise application subscriptions and containerization, security, IAM, data protection, automation, and disaster recovery.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and/or operational experience or implementation of insider threat related technologies, including DLP, UEBA, Email Security, EDR, Web Proxy, Data Protection, and IAM. able to perform hands on analysis and triage of potential Insider Threats and maintain strong relationships with clients across our firm , with experience in understanding or writing complex event search correlations supporting detection analytics involving security event data to triage, investigate and respond to insider threat events.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Information Governance technology ecosystem and how it supports Information Governance processes including: enterprise content / document management systems, records management systems, archival systems, legal hold management systems, mobile device management systems, communication surveillance applications, privacy compliance management systems, data discovery and scanning, etc.
$116,200 - $213,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop an understanding and use of system management tools, utilizing Jamf, Apple Business Manager, Workspace One, Google Workspace, Nexthink, Device Automation, Enterprise Connect and additional technologies.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience selling Endpoint security based solutions (such as malware/exploit prevention, anti-virus, whitelisting, advanced data loss protection products, cloud security solutions, data lake/log consolidation technologies, and XDR is required.
$141,500 - $194,500 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago
data protection enterprise jobs
FEATURED BLOG POSTS
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.