- UpvoteDownvoteShare Job
- Suggest Revision
Under limited direction, the Application Security Engineer is responsible for securing the bank’s network and external-facing applications through continuous penetration testing, application code review, threat hunting, web application firewall management, and vulnerability scanning.
$120,000 - $170,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate as a member of the IT management team in governance processes of the organization’s security strategies. The NA IT Security Manager directs the planning and implementation of enterprise IT systems, business operations, and facility defenses against security breaches and vulnerability issues.
$145,000 - $155,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Fort Meade MD Jobs, ServiceNow System Administrator, ServiceNow, Systems Administrator, IT Service Management, ITSM, Information Technology Infrastructure Library, ITIL, Governance, Risk, and Compliance, GRC, Human Resources, HR, and Customer Service Management, CSM, JavaScript, PowerShell, Incident Management, Problem Management, Change Management, Service Catalog, Support, Systems Administration, Security Clearance, Maryland Recruiters, IT Jobs, Maryland Recruiting.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide risk mitigation strategies Maintain Third Party Risk Management Program (TPRM) and analyze SOC- and other reporting including mapping to key IT security and compliance controls such as NIST, PCI, and COBIT. Manage IT security vulnerabilities management program aligned with PCI and NIST standards.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Charlotte NC Jobs, Information Technology Director, IT Customer Support, IT Business Change Management, User Administration, Systems Administration, Network Administration, IT Management, POS Systems, Project Management, Network, Networking, IT Support, Restaurant Industry, North Carolina Recruiters, IT Jobs, North Carolina RecruitingLooking to hire for similar positions in Charlotte, NC or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Eight (8) years of experience in Business Continuity, Disaster Recovery, Incident Management/Response, Cyber Security, IT Risk Management, IT Audit or a combination of other directly related experience.
$83,122.92 - $115,407 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Excellent organizational/communication skills and attention to detailBlackLine:Implement and customize BlackLine solutions for journal entry, financial close management, account reconciliation, and compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Infrastructure security: Acts as a focal point of contact for Genmab’s IT infrastructure and operations team for several IT security domains, such as data center security, network security, and Identity & Access Management.
$165,000 - $275,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cloud security controls : Identity and Access Management (IAM), Encryption, Network Security, Compliance, Logging and Monitoring, Vulnerability Management, Disaster Recovery and Business Continuity, Cloud Access Security Broker (CASB), and Multi-Factor Authentication (MFA.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Cyber Security. One of the following certifications: CISSP, Offensive Security Certified Professional (OSCP) or GIAC Penetration Tester (GPEN) or Certified Ethical Hacker (CEH) Certification.
$132,600 - $198,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with a wide range of network equipment and security systems in use at the organization (e.g., next-generation firewalls, Cisco IOS, Cisco switches, understanding of IPS (Intrusion Prevention Systems), threat analysis and protection, sandboxing, experience and knowledge of IDS (Intrusion Detection System), IMS (Identity Management System), data exfiltration, and auditing and event logging solutions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Will be called upon to provide network designs, problem determination and resolution, document methodologies, thorough knowledge of network management, develop and support security models, execute hardware and software installations, performance tuning and recovery.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Works with highly matrixed team of IS personnel to support enterprise architecture and information security operations including, but not limited to, architecture and InfoSec principles around identity & access management models, cloud identify management providers, security information and event monitoring, and data loss prevention, perimeter (e.g. firewalls, IPS, web filtering), cloud and virtualization environments and network security (host-based firewalls, anti-virus, disk encryption.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in cloud operations, cyber security operations, vulnerability management or other IT operation-based specialist role (e.g., Site Reliability Engineer) Ensure risks and exposures are clearly understood by key partners and gain consensus from management to understand, manage, and mitigate information technology and information/cyber security risks in line with an evolving business strategy.
Full-timeExpandApply NowActive JobUpdated Today
network security it account management jobs Title: engineer sr security
FEATURED BLOG POSTS
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.