- UpvoteDownvoteShare Job
- Suggest Revision
As the Vice President, Chief Information Security Officer (CISO) at LinkedIn, you will be responsible for leading the Information Security organization, encompassing Security Operations, Identity & Access Management, Governance Risk and Compliance, and Security Infrastructure.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of major cloud platforms (Azure/ Amazon Web Services [AWS]), virtualization, networking devices (e.g., routers and switches), web services (e.g., IIS, Apache Tomcat), network security appliances (e.g., firewalls, VPNs), databases (e.g., Microsoft SQL), and intrusion prevention/ anti-malware software.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The contract's Core Capabilities are as follows: IA Management, Federal Information Security Management Act (FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 2 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The primary areas of focus for the Cloud Security Architect are to advise our clients in developing Cloud risk management strategies and multi-year implementation and remediation programs based on business priorities and risks to address Cyber Security, Cyber Defense and Business needs of their enterprise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with secure software development, data protection, cryptography, key management, identity and access management (IAM), network security (VPNs) within cloud environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advanced knowledge and abilities in at least 3 of the following technologies: Data loss prevention (DLP) Intrusion Detection systems (IDS) Intrusion Prevention systems (IPS) Anti-malware systems Vulnerability Management systems Network firewalls and security appliances Cloud security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security programs including, but not limited to, audit reviews, risk assessment, awareness and training, identity and access management, data protections, secure SDLC, incident management, disaster recovery procedures, vulnerability assessment, penetration testing, third-party assessment, secure configurations, and patch management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SS&C Intralinks is currently seeking a Senior Information Security Manager, Risk and Compliance, who will be responsible for enhancing security and compliance across both cloud and traditional data center environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledgeable in the following concepts:IT Service Management and Integration Support, On-premise and Cloud Hosting, Business Change Management, ContinuousImprovement, IT Architecture Information Risk Management and Assurance, and Collaboration Tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Analysis: Evaluate the security posture of AI systems hosted on cloud platforms, including data encryption, access controls, network security, and vulnerability management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 4 years of experience in information technology (operations, software delivery, access management, microservices), information security (application security, network security, cyber security, data protection), information systems risk management, information systems auditing, or a combination.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
5+ years cybersecurity SME experience in cybersecurity operations functions like threat detection and response and vulnerability management Experience evaluating or implementing endpoint, network, identity, cloud, data security solutions ABOUT GOLDMAN SACHSAt Goldman Sachs, we commit our people, capital and ideas to help our clients, shareholders and the communities we serve to grow.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, cyber threat intel, vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications related to or pursuing certification related to Cloud, Cyber or Technology Operations, such as Cloud provider certifications, Certified Information Systems Security Professional (CISSP), or Certified Information Security Manager (CISM.
$134,100 a yearExpandApply NowActive JobUpdated Today
network security information risk management cloud jobs
FEATURED BLOG POSTS
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.