- UpvoteDownvoteShare Job
- Suggest Revision
The IT Compliance Staff will have a direct reporting responsibility and accountability to Governance, Risk, and Compliance (GRC) Management and will work closely with leaders and team members in Information Security, IT, Business, Internal Audit, and External Audit.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsibilities include performing risk assessments of the bank’s network, applications, and endpoint activity, propose adjustments to network topology and implementation of security controls or tools to mitigate cyber risk, ensuring that the Bank’s network and data are secure in accordance with Bank, IT, and IS Policies.
$140,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certification such as PMI – Project Management Professional (PMP); Certified Information Security Manager (CISM); Certified in Risk and Information Systems Control (CRISC); Global Information Assurance Certifications (GIACs) is preferred.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will support IT risk management activities for T&I including evaluation, mitigation, and actionable activities through the existing information security and IT risk management programs at CNB. Will interact with cross-functional stakeholders to assess risk to T&I technology, establish governance, and enhance IT risk programs and create an organized process to effectively meet the goals and objective with product centric approach to comply with the enterprise risk appetite.
$101,231 - $172,355 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Support risk analysis and approval process for deviation/exemption requests to agency-wide Web Filtering, SSL Inspection, Data Loss Prevention (DLP), and IT Configuration Management policies, and perimeter Unified Threat Management (UTM) devices.
$110,000 - $130,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are currently in search of a passionate professor for undergraduate/graduate-level in Information Systems and Technology in a Hybrid format. Business (IT Management) And Work Experience in the field, please submit your resume.
Part-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work with system owners to maintain current Authorities to Operate in a manner compliant with the Federal Information Security Management Act (FISMA), DoD Risk Management Framework (RMF), and National Institute of Standards and Technology (NIST) guidance.
$120,000ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Information Security, Audit or related field, and five (5) years progressively responsible information security assessment or audit experience, required or High School Diploma or equivalent, and eight (8) years progressively responsible information technology risk management experience, required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proficiencies in one or more of the following technical IT security domains or equivalent: Platform Security Standards, Network Security, Cloud Governance, Cyber Operations Management, Access and Identity Management Governance etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform independent risk assessments of information risk management related disciplines, including information technology, information security, business continuity management and disaster recovery and records management.
$120,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Five or more years of experience in business process controls and IT risk management, internal audit, IT security, or other IT compliance related work. Our Risk Advisory Services Technology Risk Consulting (TRC) Managers serve complex global clients aspiring to help transform their IT risk management and assurance capabilities to be aligned to the key risks and strategies of their organization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree from an accredited college or university in Computer and Information Science, Computer Engineering, Computer Systems Analysis, Information Cybersecurity and five (5) years of progressive information security experience across various information security/information technology risk management domains such as but not limited to application security, infrastructure security, identity, and access management, vulnerability and cyber threat management, security architecture, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Access Control, Application Security, Business Continuity & Disaster Recovery Planning, Cryptography, Information Security and Risk Management, Compliance & Investigations, Operations Security, Security Architecture & Design, Telecommunications & Network Security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You have several years of relevant experience in at least one of the following areas: information security, IT security, IT risk, IT governance, business continuity management, IT compliance, data protection.
Full-timeExpandApply NowActive JobUpdated Yesterday
network security it information technology risk management jobs Title: engineer vulnerability management
FEATURED BLOG POSTS
How To Decorate a Cubicle for Inspiration & Productivity
You know the negative reputation cubicles have – dull, dreary, gray. How can you possibly be expected to sit in one every day and be your naturally productive, enthusiastic, and upbeat self? The answer lies in decorating your cubicle so it sparks creativity and feels welcoming. While this might seem impossible given the bland canvas you have to work with, take heart because it’s totally doable!
How do Employers Verify Education?
At any stage in your professional journey, you may come across an employer or a recruiter who asks to verify your educational credentials. This shouldn’t come as a surprise as 30% of candidates admitted to lying on their resumes, yet 79% of them never get caught. In fact, 85% of employers in the US who conduct background checks find that candidates have lied on their resumes or job applications.
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.