- UpvoteDownvoteShare Job
- Suggest Revision
Minimum Qualifications Bachelor's Degree in Information Security, Audit or related field, and five (5) years progressively responsible information security assessment or audit experience, required or High School Diploma or equivalent, and eight (8) years progressively responsible information technology risk management experience, required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security: Awareness of cloud security best practices, including identity and access management (IAM), encryption, network security, and compliance standards specific to AWS or Azure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Gurucul technology is used by Global 1000 companies and government agencies to fight cybercrimes, IP theft, insider threat and account compromise as well as for log aggregation, compliance and risk-based security orchestration and automation for real-time extended detection and response.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Privacy Analyst supports Lamb Weston's Personal Data Privacy Program and Information Security Management, ensuring that business and operations are performed in compliance with global privacy laws, regulations, and internal company policies while minimizing risks and supporting our business's abilities to meet its customer commitments and company objectives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will be responsible for developing and managing a productive Sales team of Individual Contributors selling our Governance, Risk, Compliance and Security Assurance Cloud solution.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
By combining tactical skills with a deep understanding of global Data Privacy Regulation (i.e. GDPR, CCPA), local data-centric regulations (i.e. SOX, GLBA), and industry best practices (i.e. AI Ethics, PII, IAPP and PCI credentials and certifications), Data Governance is a critical partner to Enterprise Risk, Information Security, Compliance, Privacy, and Legal to enable and drive business goals and FIS data strategy, while helping to protect from risk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are creating an operationally effective and highly efficient “service of common concern” for all Integrity, Security, Support, and Operations (ISSO) Governance, Risk, and Compliance (GRC) needs, ensuring Integrity, Security, Support, and Operations continue to meet global regulatory requirements and manage risk.
$188,000 - $256,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our goal is to make Meta the premier place to work for governance, risk, compliance, security, and integrity professionals. The ideal candidate is an experienced Security or Trust & Safety professional who delivers high quality work across Security, Compliance and Integrity teams seamlessly and acts as an effective "human API" between GRC, Product, Legal, Regulatory Offices, and the business, maintaining deep Security & Integrity subject matter expertise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Passionate about Governance, Risk and Compliance (GRC), with an understanding of IT risk, operational risk management, business continuity and disaster recovery, vendor management, audit management, compliance, and policy management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience in security, trust & safety, Integrity, content policy, transparency reporting, governance, compliance, or risk management. Meta's ISSO GRC is the central engine driving risk management and compliance at the company, supporting Meta and the family of apps.
$188,000 - $256,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Internal Audit is an integral and valued component to Global Payments’ risk management environment and works closely with management to deliver value-added and challenging audit projects in the area of information technology, information security, business operations, finance & accounting, and compliance using progressive audit procedures.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Global Chief Information Officer, the Chief Information Security Officer (CISO) is responsible for identifying, recommending and overseeing the delivery of an information security plan to support the organization’s desired security posture in safeguarding its assets and those entrusted to its care to fulfill its mission and operate as a going concern.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have expert-level knowledge in one or more of the following cybersecurity areas; security architecture, cloud security, risk management, compliance, security governance, networks, protocols, threat management, change management, vulnerability management and overall cyber security best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10 years-of demonstrated progressive experience in IT, Program management, security risk management, compliance and/or change and transformation management. We serve customers in more than 180 countries, operating through four divisions: Health; Tax & Accounting; Governance, Risk & Compliance; and Legal & Regulatory.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Four or more years of experience in business process controls and IT risk management, internal audit, IT security, or other IT compliance related work. Our Risk Advisory Services Technology Risk Consulting (TRC) Supervisors serve complex global clients aspiring to help transform their IT risk management and assurance capabilities to be aligned to the key risks and strategies of their organization.
$90,500 - $180,600 a yearFull-timeExpandApply NowActive JobUpdated 2 months ago
global security risk and compliance jobs
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.