- UpvoteDownvoteShare Job
- Suggest Revision
Wharton's Information Security Office is searching for a Director of Information Security to join our Information Security Team. Reporting to Wharton's Chief Information Security Officer this position is responsible for leadership and management of cloud security, security architecture, security engineering, Identity & Access management, DevSecOps, and other key areas of information security for the Wharton School.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate expertise in cloud security and vulnerability management. Responsible for monitoring SIEM and analyzing potential threat events using Security tools such as Tenable, Crowdstrike ArcticWolf XDR solutions.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Engineer (Vulnerability Management Specialist/Engineer), your responsibilities include assessing risk and running continuous vulnerability monitoring of the environment, including segments requiring FedRAMP compliance.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provides technical expertise and support to bank, IT management, and other infrastructure staff in risk assessments, implementation and operational aspects of appropriate information security procedures and productsResponsible for all technical solutions supported by Information Security, to include perimeter firewalls, IDS/IPS, DLP, VPN, and vulnerability management solutionsDevelops and oversees remediation processes.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Engineer (Vulnerability Management Specialist / Engineer) Relevant certifications (Security+, CySA+ SSCP, CISSP, CISM, SANS GSEC, etc.) Knowledge and working experience with vulnerability management systems including Tenable Core, Qualys, and/or Rapid7 InsightVM.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of security topics, including access control, network and systems hardening, threat modeling, encryption, vulnerability management, digital forensics, and incident response.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification: Must possess an appropriate and current DoD Information Assurance (IA) Certification to be considered for employment; either valid CompTIA Security+ CE, Systems Security Certified Practitioner (SSCP) or Cisco Certified Network Associate (CCNA)-Security.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Technical expertise in 2+ security domains between endpoint security, network security, email and web security, data security, identity security, cloud, containers, Operational Technology (OT), vulnerability and configuration management, threat intelligence management, security automation, and security incident and event management (SIEM.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Duties: The Vulnerability and Management Lead works directly with the Information System Security Officer (ISSO) and Information System Security Manager (ISSM), NetOps groups, Cyber Leadership, CIO leadership, Application Development and Engineering teams to to implement a Cyber Ready posture.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The purpose of this position is to provide technical leadership and management of MTA’s cyber security program in Supply Chain and Third-Party Risk Management. Cloud-based knowledge management technologies and concepts related to security, governance, procurement, and administration.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Cisco CCNP Security or CCIE Security, Palo Alto Networks PCNSE, or demonstrable experience level required. Present to AMs, management, other RSI personnel and customers on new technologies.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The ISSO conduct risk analyses and writes documents including Plan of Action and Milestones, System Security Plans, System Specific Policies and Procedures, Configuration Management Plans, Contingency Plans and Test Results, Business Impact Analyses, and Security Impact Analyses.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with the Third-Party Risk Officer to support oversight of the information security requirements of the bank's Third-Party Risk Management Program in line with GLBA and FTC standards.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
ExpandApply NowActive JobUpdated 4 days ago
security management jobs
FEATURED BLOG POSTS
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.