Advanced Search


Focus Search:

vulnerability management
management analyst
cyber security
information security
risk management
  • Last Updated
  • Relevance
  • Urgently Hiring
All Jobs
  • All Jobs
  • Active
6,903,649 Jobs
Senior Risk & Security Management Advisor (Hybrid)
PinkertonMiami, FL
Responsible in developing and accessing security programs and policies including: Enterprise Security Risk Management, Crisis Management, Threat Management, Travel Security, Security Operations, Access Control, Asset Management, Security Vendor Management, Crime Prevention Through Environmental Design, Investigations, Executive Protection, Workplace Violence Prevention and Protection, Business Continuity.
Senior Risk & Security Management Advisor (Hybrid)
PinkertonAnn Arbor, MI
The Senior Risk & Security Management Advisor is a recognized expert in the security industry with specialized knowledge of physical security, enterprise security planning, security tactical operations, and is well versed in one or more sub-specialty industries (e.g., risk assessments, crisis management, executive protection, etc. Is Security Management Salary?
Even more importantly we believe our team is our most valuable resource, and seek to provide a work environment that is rewarding, engaging, and FUN!
This position offers a base salary, profit sharing and even relocation assistance for the right candidate if they are not local.
Insider Threat Analyst
XOR SecurityWashington, DC
Digital Forensic or Incident Response Certifications such as: GCIA, GCED, GCFA, GCFE, GCTI, GNFA, GCIH, ECSA, CHFI, CISSP, Security+, Network+, CEH, CND. CCE, CFC, EnCE, CFCE, GREM. Additionally the ideal candidate would be familiar with insider threat monitoring software, host-based forensic tools, intrusion detection systems, intrusion analysis, security information event management platforms, endpoint threat detection tools, and security operations ticket management.
Director, Identity And Access Management
Georgetown UniversityWashington, DC
This is a Senior-level position within the UISO that represents the Office of the Chief Information Security Officer (CISO) on identity and access management across GU. S/he is the point-of-contact for the identity issues and concerns related to departments and organizations outside UIS, the representative of the organization's identity security presence to external parties, and will act as the contact point for external auditors and agencies relating to the IDM program.
Senior Information Systems Security Officer (ISSO)
Converged Security SolutionsWashington, DC
You must have advanced knowledge of network security concepts and best practices with a thorough knowledge of FISMA, NIST Risk Management Framework, and DITSCAP / DIACAP.Essential Job Duties and Responsibilities:As Evolver s Senior ISSO, you will manage the vulnerability mitigation and information security processes of a major Federal Department with a National Security mission.
Identity & Access Management Consultant (IAM)
MaxonicAnn Arbor, MI
Expert design, enhancement, and advanced support of a global enterprise-level directory service with a focus on any of the market leading IAM products like (Sailpoint, Okta, Ping Identity, Saviynt, Oauth, & CyberArk) and its related technologies, including Single Sign-On (SSO), Universal Directory (UD), Multi-factor Authentication (MFA), and User Lifecycle Management.
Hiring Transparency

Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.

Architect - Identity And Access Management
Capgemini EngineeringCharlotte, NC
Strong hands-on technical experience enterprise-wide with Microsoft Identity and Access management services (Azure Active Directory, conditional access, SSO, MFA, PAM/PIM, and third party IAM solution integration with AAD) in implementation and transformation projects Expert level experience with IAM Protocols such as WS-Fed, SAML, OpenID Connect and OAuth Platform & technical experience implementing Okta focused security solutions for modelling enterprise and cloud access models.
Sr. Cyber Security & Risk Engineer
AegistechNew York, NY
Strong knowledge of Enterprise Information Security pillars (Perimeter Security, Identity Management and Governance, Privileged Account Management, Compliance, Penetration Testing, Encryption, Cloud Security, Incident Response, Vulnerability Management.
Cybersecurity Policy Leader
Resource InteractiveNew York, NY
Come work for the office of the IBM Chief Information Security Officer (CISO) and help meet the global challenges of keeping one of the largest companies in the world secure. Good understanding of Network Architecture, Federation, SSO, DLP, Cloud Security, Implementation of CASB, Privileged Account Management, Endpoint Security, Asset Management / Security, Protection of Business-Critical Systems, VPN, Wi-Fi Security, HTTPS/TLS, Key Management, PKI, Cryptography, etc.
Event Security - RODEO
Allied Universal SecurityHouston, TX
Now hiring Event Staff and Event Security to work CONCERTS, RODEO at NRG STADIUM. Allied Universal is looking to hire Event Security. Allied Universal® Event Services, North America's leading crowd management, event staffing, and consulting company, provides rewarding careers that give you a sense of purpose.
Recruitment strategies that are weird, but actually work 

In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work. 

Emergency Response & Security Management Intern
Plains All AmericanHouston, TX
Gain an understanding of the oil and gas midstream industry, Health Safety and Environmental practices, hazardous materials concepts and response requirements, Plains Emergency Response & Security Management (ER&SM) Program, and associated regulatory (PHMSA, EPA, DOT, etc) requirements.
Information Security Officer
State of ColoradoDenver, CO
The Chief Information Security Officer (CISO) and the campus Information Security Officers jointly oversee the University of Colorado's efforts to protect its computing and information assets and to comply with information-related privacy and security laws and regulations.
Software License Management Specialist
ManTech International CorporationCastine, ME
DoD approved 8570 Certification for IAT-II, which include any of the following: CCNA Security, CySA+, GICSP, GSEC, Security+ CE, CND, SSCP. Please note that higher level (i.e. IAT-III) approved baseline certifications also meet the lower level IAT-II requirement and include: CASP+CE, CCNP Security, CISA, CISSP (or Associate), GCED, GCIH, and CCSP.
Director, Identity & Access Management
Genuine PartsAtlanta, GA
In-depth knowledge of information security industry and regulatory obligations (Sarbanes-Oxley (SOX), HIPAA, GLBA, PCI DSS, HITRUST, NIST Framework, etc. Include focus and expertise in Privileged Access Management (PAM), Customer Identity Access Management (CIAM), Identity Governance and Administration (IGA) and Employee Identity Access Management (EIAM) to include Single Sign on and Multi-factor authentication.
How To Make $100K a Year – No BS Strategies & Advice

If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.

Senior Manager Security Risk Management
Verizon CommunicationsLake Mary, FL
Professional certifications include Certified Information System Auditor (CISA), Cybersecurity Practitioner Certification (CSX-P), Certified Information Systems Security Professional (CISSP), Certified Internal Audit (CIA), or Certified Public Accountant (CPA.

security management jobs

Latest Blog Posts: to Write a Recommendation Letter for a StudentWhen a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities. To Answer “Why Do You Want to Be a Supervisor” in an InterviewAnyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer: is Career Cushioning?Is your organization prepared for “career cushioning”? the Move to Salary TransparencyThe salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit. Reputation 101People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts. in a Tight MarketAs a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more. to Build a Candidate PersonaA candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.