- UpvoteDownvoteShare Job
- Suggest Revision
Understanding of common security domains and methods of auditing them, including security operations, network security, systems administration, sSDLC, encryption, resilience, response and recovery, asset management, identity and access management, and vulnerability management.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At a glance, DGR Systems was founded in 2009 in Tampa, Florida and provides full-service solutions in the areas of Modern Workplace (Endpoint Solutions, Collaboration), Security (Identity and Access Management, Zero Trust, Information Protection) Modern Infrastructure and Cloud, and Applications (Collaboration Apps, SQL Reporting, Power Platform.
ExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Try new things, learn new skills and discover what you excel at—all from Day One. Job DescriptionU.S. Bank's Identity Access Management (IAM) team is seeking a Sr. Information Security Specialist to provide security oversight expertise and support information security objectives related to access management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10 years experience as a business leader in fraud management to include fraud prevention and detection, information security, customer identity and/or access management within a large financial institution.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role, The Azure Security SME will develop software and recommend security controls and threat protection, managing identity and access management, defining organizational structure and policies, in Azure technologies to provide data protection, configuring network security defenses, collecting and analyzing Azure logs.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilizes an understanding of Information Technology and Security experience with topics like Security Architecture, Network Security, Identity and Access Management, Software Development and Data Protection in support of audit and advisory projects.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Security Manager, Access Management role reports directly to the Director, Identity and Access Management and is a member of the cybersecurity leadership team.
Full-timeRemoteExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Implement control systems solutions including, but not limited to, Identity and Access Management (IAM), Data Loss Prevention (DLP), Anti-Exploitation, Next Generation Firewalls, Intrusion Prevention Systems (IPS), Network Access Control (NAC), Public Key Infrastructure (PKI), Virtual Private Network (VPN), Malware Analysis, and Application Whitelisting.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate strong technical knowledge across all aspects of security, with particular expertise in at least one of the following areas: incident response, identity and access management (Active Directory and ideally, Sailpoint), application security, threat and vulnerability management, Microsoft security (Azure, AD.
$100,000 - $125,000 a yearFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reporting directly to the Chief Information Security Office (CISO), this role contributes to the Identity and Access Management program at Northeastern University's global campus system.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilizes a variety of security information and event management (SIEM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in designs. Utilizes a variety of security information and event management (SIEM), data loss prevention (DLP), intrusion preventionsystems (IPS), and other tools in designs.
Full-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
The Principal Cloud Security Architect will direct and guide other technology teams within Crown Castle for all matters related to cloud security strategy and implementation, including Security Tools within Cloud ecosystems (Azure and AWS), Network IPS/IDS, Identity and Access Management (IAM), User Entity and Behavior Analysis (UEBA), Zero Trust, DevSecOps, Security Access and Service Edge (SASE) and Security Frameworks and Methodologies, and Threat Modeling.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensures data integrity for access information that enables accurate identity and access management provisioning. Applies risk management knowledge to improve efficiency and effectiveness of access administration.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Compelling opportunity for an experienced and talented leader to own Western Digital's IAM (Identity and Access Management) program within the company's Information Security organization, reporting directly to the CISO (Chief Information Security Officer.
$150,000 - $202,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with data protection, cryptography, key management, identity, and access management (IAM), network security within SaaS, IaaS, PaaS, and other cloud environments.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated 3 months ago
identity and access management information security jobs
FEATURED BLOG POSTS
Why is Professionalism Important & How to Be Professional
You might have heard the word professionalism thrown around in the workplace, but do you know what it means? And do you know how to maintain professionalism no matter the circumstances?
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.