- UpvoteDownvoteShare Job
- Suggest Revision
Minimum of a bachelor's degree in information security, Computer Science, or related field, with at least six years of focused experience in information security architecture. Over ten years of IT experience, with substantial involvement in information security.
$170,000 - $220,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Job Description: Information Security Analyst (Architect) This role will assist with the creation of a true SDLC program with DevSecOps for our in-house built applications and work with developers to implement information security best practices ensuring that our code is proactively secured while in the pipeline prior to moving to production.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Technology also conducts incident response, threat management, vulnerability scanning, virus management and intrusion detection and completes risk assessments. Develops and maintains cloud security standards, and procedures that align with company-wide information security initiatives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
7+ years of experience in information security and/or IT risk management with a focus on information security, engineering, and reliability. Experience with common information security management frameworks, such as International Standards Organization (ISO) 2700x, NIST-CSF series and the IT Infrastructure Library (ITIL.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Information Security Architect, you will be responsible for protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Contributes to the creation of information security technology strategies and roadmaps based on business strategy, cybersecurity assessments, IT trends and the overall threat landscape. + Ensures project adherence to information security remediation efforts during solution build and implementation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Contributes to the development of information security architectures that align with assessment remediation requirements, reference architectures, design patterns and technology standards. Information Security and Risk develops, implements, and enforces security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Builds consensus across peer teams in Information Security and drives transformational growth amongst all parties involved. Information Technology oversees the effective development, delivery, and operation of computing and information services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This function anticipates, plans, and delivers Information Technology solutions and strategies that enable operations and drive business value. Familiarity with DevOps tools (Jenkins, Docker, Kubernetes) Industry-specific certifications (CISSP, CCSP, AWS Certified Security - Specialty.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Designs cloud security architectures that integrate with existing on-premises infrastructure and meet regulatory requirements (HIPAA, PCI-DSS, GDPR) Cloud computing platforms (AWS, GCP, Azure) Cloud security tools and technologies (CloudWatch, CloudTrail, Azure Security Center) Programming languages (Python, Java, C.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a member of the Information Security (InfoSec) Global Tech Assurance team, you will play a key role leading the design and implementation of solutions/tooling to aide in our objective of creating automated preventative and detective controls and processes to ensure policy compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Option 1: Bachelor's degree in computer science, information technology, engineering, information systems, cybersecurity, or related area and 5years' experience in software engineering or related area at a technology, retail, or data-driven company.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must Have Deep Expertise in AWS Architecture Self-starter and Senior Architect who can lead the Azure architecture program Information Security Architecture Background ,CIS Benchmarks, NIST Framework Industry security standards (NIST, FED Ramp)and frameworks (ISO, SOX, SWIFT, OWASP, NIST Cyber Security, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The primary responsibility of the Business Information Security Architect - Cyber Security is to serve as the primary point of contact between the information security function and the assigned business unit and/or Information Technologies department.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At New York Presbyterian Hospital Information Technology is at the forefront of our patient experience. As a Technical Architect you will effectively advise and implement new initiatives in the VMware environment.
Full-timeExpandApply NowActive JobUpdated Today
information job Title: information architect
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.