- UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred: knowledge in technology areas including, but not limited to: access management, network security, enterprise architecture, release management and incident response.
$80,000 - $100,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Accounting, Finance, Management Information Systems, Management Information Systems & Accounting, Computer and Information Science, Computer and Information Science & Accounting, Mathematical Statistics, Statistics, Mathematics, Economics, Economics and Finance, Economics and Finance & Technology, Business Administration/Management, Engineering.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We work to solve business problems for example from siloed to integrated risk management operating model or from fragmented data and technology to enterprise GRC technology and analytics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Identifies key risks and mitigating factors related to technology risk such as Change Management, Architecture, SDLC, service continuity, cloud services, asset inventory, incident and problem management.
$65,000 - $109,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support includes assessing and continuously monitoring cybersecurity risk ensuring that legacy and new capabilities adhere to enterprise standards such as Risk Management Framework (RMF), Cybersecurity Framework (CSF), and National Institute of Standards and Technology (NIST) and per Authorization Official's Information System's Continuous Monitoring (ISCM) strategy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Risk management, compliance management, and/or enterprise governance as it relates to how technologies can be and are leveraged throughout organizations' internal audit, risk and compliance functions and processes, as well as the associated benefits that can be realized.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Peraton requires a Storage and Database Architect to support the Special Operation Command Information Technology Enterprise Contract (SITEC) Applies cybersecurity principles and practices, including information security, incident response, and risk management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess at least five (5) years’ experience or equivalent in Information Technology field, including at least three (3) years in enterprise technical support, IT support and IT Help Desk, as a technical engineer or similar role.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Director of Information Security reports to the Chief Information Officer (CIO) and is responsible for information security policy assessments, enforcing compliance with firm security policies and applicable law, vendor management and security incident management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
1 year of work experience in incident response, incident investigations, privacy role, program management, or project management. Bachelors degree, preferably in engineering, information technology, data science, computer science, or another technical discipline.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (Ex. Cyber Incident Response Team, Data Loss Protection, Cyber Threat Operations Center and Digital Forensics) along with other Truist investigatory units (Ex. Human Resources, Legal, Corporate Security, Ethics, Corporate Investigations) and liability risk officers and technology management to guide EITP investigations and activities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in secure coding practices, threat modeling, security architecture, vulnerability management, enterprise security, application security, incident management, security incident, networking, information technology operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possesses in-depth experience with Network Intrusion Detection/Prevention systems, Enterprise Application Layer Firewalls, Enterprise Endpoint Protection, Enterprise Authentication Technologies, Security Event Information Management, Vulnerability Assessment, and cybersecurity incident response and forensics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
DRCG offers expertise in Systems Integration (SI), Information Technology (IT) solutioning, Program Management, Risk Management, Business Process Reengineering (BPR), Requirements Engineering, Workflow Solutioning, and Business Consulting Services.
ExpandApply NowActive JobUpdated Today
incident management enterprise information technology jobs
FEATURED BLOG POSTS
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!
Guide to Hiring a Teenager
Teenagers are full of life. They bring energy and adaptability that may be hard to get from older workers, but does that mean that hiring teens is beneficial? Well, it depends. As you debate whether or not you should integrate teenagers into your workforce, there are some things that you should know first.