- UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides oversight on key Health Information Management (HIM) services provided at a DHS hospital, such as Medical Coding, Release of Information, Document Scanning and Validation, Data Capture and Reporting, Clinical Document Deficiency Tracking, and File Room Maintenance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Activity CIO develops, implements, and maintains the contribution to a set of overarching Information and/or Data Strategies issued by: NAVSEA, DoN, and DoD. Provide support to both PEO IWS's internal management needs as well as provide an external liaison support function between PEO IWS, NAVSEA CIO, DON CIO, and, as required, other related external organizations to harmonize and leverage information requirements across the DoN Enterprise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provides security expertise in Federal Information Security Management Act (FISMA), Office of Management and Budget (OMB), National Institute of Standards and Technology(NIST) and federal government requirements to support IT Security and Privacy compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Head of Information and Security, this individual will oversee and manage eMoney’s IT risk management program on third party service providers, Internal and External audits and client security requests and risk assessments in accordance to eMoney Advisor standards.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide Leadership to the Department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security and risk management innovation; demonstrate and champion the following characteristics in fulfilling the responsibilities of the job - passion, empowerment, accountability, collaboration and ethics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with the Third-Party Risk Officer to support oversight of the information security requirements of the banks Third-Party Risk Management Program in line with GLBA and FTC standards.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Develop and report on key risk indicators and performance measures for enterprise, vendor, and third-party information security, such as periodic updates for enterprise risk management (ERM), Board and the Executive Committee (EC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advise senior management (e.g., Chief Information Security Officer [CISO]) on risk levels and security posture. The Information Systems Security Manager (ISSM) will be responsible for leading a team to execute risk management efforts against the CAO’s inventory of on premise, vendor, and cloud-based systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The primary purpose of the Program Manager - Building Information Management position is to develop, manage, and execute MD Anderson Cancer Center's BIM compliance across institutional and capital projects.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional information security management certification preferred, such as a Certified Information Systems Security Professional (CISSP), Certified Chief Information Security Officer (CCISO), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10 - 15 years in Information Security and/or Information Risk Management and/or Information Technology. This job directs and manages Information Security and Risk Management (ISRM) services for the Enterprise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10 - 15 years in developing, communicating and presenting Information Security and Risk Management concepts to varying audiences. Actively contributes to the ISRM strategic planning process by working with the Chief Information Security Officer (CISO) to develop and implement department strategic plans and action steps that support the corporate strategic objectives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM) Certified in Risk and Information Systems Controls (CRISC) Bachelor's Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field, or relevant experience and/or education as determined by the company in lieu of bachelor's degree.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and Practices and Information Security Policy.
ExpandApply NowActive JobUpdated Today
management information jobs
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: