- UpvoteDownvoteShare Job
- Suggest Revision
Collaborate effectively with 2nd line of defense (Compliance, Legal, Enterprise Risk Management, Operational Risk Management, Sarbanes Oxley (SOX), Cyber Risk Management, etc.
$8Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Perform independent risk assessments of information risk management related disciplines, including information technology, information security, business continuity management and disaster recovery and records management.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and oversee operational information systems security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint Special Access Program Implementation Guide (JSIG) authorization process.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience: IT/IT Security and/or Corporate Risk/Audit Work experience- 6+ years IT Risk Management and/or IT Internal Audit including experience in Information Security & Technical Privacy- 4+ years.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with the IT Security Manager on cybersecurity risk management and vendor risk management. is responsible for the analysis, design, implementation, and ongoing management of security controls.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Engineer (Vulnerability Management Specialist/Engineer), your responsibilities include assessing risk and running continuous vulnerability monitoring of the environment, including segments requiring FedRAMP compliance.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Engineer (Vulnerability Management Specialist / Engineer) Relevant certifications (Security+, CySA+ SSCP, CISSP, CISM, SANS GSEC, etc.) Knowledge and working experience with vulnerability management systems including Tenable Core, Qualys, and/or Rapid7 InsightVM.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Currently oversee multiple strategies: Enterprise Risk Management, Third-Party Risk Management, IAM, Application Security and others. Management of Enterprise Risk Management (ERM) activities: Process, monitor, and report on security/compliance risk items.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations - Managed Services, and Identity and Data Management.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge and experience with Cloud Security Posture Management tools (Azure Policy, AWS Config, Prisma Cloud) Managing Risk - Assessing and effectively managing all of the risks associated with their business objectives and activities to ensure they adhere to and support PNC's Enterprise Risk Management Framework.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working with other stakeholders, the function is also the important catalyst and discussion partner with respect to broader BCG enterprise risk topics, including, but not limited to, areas of contracting and client matters, confidentiality, HR, IT, legal, and compliance topics including anti-bribery and corruption, KYC, supplier management, information management, insider trading, conflicts of interest, information security, and data privacy, etc.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Solid understanding of cybersecurity processes and concepts (e.g. vulnerability management, security governance, software development, incident response, physical security, auditing and logging, micro segmentation, secure access service edges, zero trust architecture, SBOM, Secure Software Development Lifecycle, Insider Threat, Digital Supply Chain, Vendor Risk Management, PKI, penetration testing) as well as application controls and segregation of duties.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional security or risk management certifications, [Certified Risk Management Assurance (CRMA), Certified Regulatory Compliance Manager (CRCM), Certified Information Systems Security Manager (CISSM), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Information Systems Auditor (CISA), or Certified Risk & Information Systems Control (CRISC.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Drives information security risk management activities, including policy and standards development, information security and compliance control assessment, security awareness and training, third-party/vendor risk management.
ExpandApply NowActive JobUpdated 4 days ago
security management risk jobs
FEATURED BLOG POSTS
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.