VP, IT Security Operations And ControlsSony PicturesCulver City, CAThe VP of IT Security Operations and Control is accountable for the planning, strategy, implementation, and operations of all technologies related to Endpoint security (EPP/EDR), Active Directory Services (MS ESAE), VulnerabilityManagement, Application Security, Identity Access Management and IT Change Control group while specifically ensuring the availability, integrity, and security for all systems worldwide.StaffMarcum LLPFort Lauderdale, FLAssist with penetration testing, vendor and third party risk management, data privacy and information governance implementation, and vulnerabilitymanagement program. Assist with review of system security monitoring and analysis tools, Identity and Access Management platforms, IT-GRC platforms, and DLP systems. Full-time
You know the language of grants and RFPs, and how to judge if an opportunity is a good fit for an applicant.
This position is on a Forest Service unit where the incumbent serves as administrative support to one or more Grants Management Specialists.
Senior IT Security EngineerAltice USA IncBethpage, NYHands on experience with the following security technologies: Cisco Identity Services Engine, SEP Anti-Virus and Anti-malware systems, Tenable vulnerability scanners, Metasploit or other application penetration testing systems, CyberArk and/or SailPoint, LogRythm, Checkpoint and/or Cisco FirePower technology, RSA SecurID, Crodwstrike.Desktop Engineer / SCCM SpecialistNtt DataLemont, ILKnowledgeable and have used vulnerabilitymanagement tools such as Tenable SC and is able to interpret vulnerabilitymanagement output/scan results and develop remediation activities to be presented to change management and cyber teams.Director Vulnerability Management (Remote)RELX GroupPhiladelphia, PAThis role will primarily be focused on maturing the vulnerabilitymanagement and security assurance functions within the GRC team. Hands on experience in both vulnerabilitymanagement and security assurance.RemoteSr. Cybersecurity SpecialistLevi Strauss & CoSan Francisco, CAMature an emerging Threat Intelligence function by developing core foundational components to evaluate intel through the lens of cyber risk management, from initial analysis to final action. Minimum of four years or related experience in information security roles involving threat intelligence and/or vulnerabilitymanagement.
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Vice President of Information TechnologySony Pictures EntertainmentCulver City, CALeads SPEs VulnerabilityManagement, Application Security, IT Change Management, Active Directory Services, Identity Access Management, and global Endpoint management security activities in close collaboration with SPEs Information Security teams, ensuring clear and measurable security operations are executed, and a clear operation metric methodology is in place to allow consistent compliance across all areas.Manager, Cybersecurity - Vulnerability Management, Analysis And ResponseT - MobileBellevue, WAThen come join the Cybersecurity, Trust and Protection Organization at T-Mobile as the Manager, Cybersecurity - VulnerabilityManagement, Analysis and Response! They coordinate Incident Response, conduct Vulnerability Assessments, install security patches, operate Intrusion Prevention Systems, correlate security related data across the enterprise, administer Firewalls and other access control points, and maintain Anti-Virus systems.Security ArchitectCisco SystemsRaleigh, NCCisco's Security Visibility and Incident Command team is looking for a Security Architect focused on Vulnerability Scanning with extensive experience developing for cloud technologies such as Amazon Web Services (AWS), Google Cloud Platform (GCP), Azure and private clouds with working experience with Kubernetes and Docker and Vulnerability Scanning technologies such as Tenable, Qualys and Rumble.Principal, Cyber Security ArchitectBNY MellonAshburn, VAOur cyber capabilities encompass the full spectrum of services from Cyber Operations (SOC, Cyber Threat Intelligence, VulnerabilityManagement, Cyber Incident Response, Penetration Testing & Red Teaming, Cyber Analytics & Fraud, and Insider threat) to Cyber Architecture and Engineering (Network, Platform, Cloud, and Applications Security.
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
Sr. Cybersecurity SpecialistLevi StraussSan Francisco, CAThis role will be key in building and maturing LS&Co's threat intelligence, security awareness, and vulnerabilitymanagement programs. Further, this position works with the broader Global Information Security (GIS) team to support cybersecurity strategy, priorities, and directives consistent with the vision of the Chief Information Security Officer (CISO) across LS&Co. globally.ServiceNow GRC SME, MidBooz Allen HamiltonMcLean, VALead planning, design, and integration of the Federal Civilian customer's ServiceNow Governance Risk and Compliance ( GRC ) , SecOps, and ITSM modules to improve the effectiveness and efficiency of asset, risk, and vulnerabilitymanagement. Full-timeSecurity ArchitectCisco Systems, IncSan Jose, CAThe primary mission of SVIC is to help ensure enterprise, system, and data risk management by performing comprehensive investigations into cyber security incidents, and to assist in the prevention of such incidents by either compliance or engaging in dedicated threat assessment, mitigation planning, incident trend analysis, and security architecture review.Security ArchitectCisco Systems, IncRaleigh, NCThis will be a hands-on role supporting the VulnerabilityManagement Operations Program. Strong understanding of vulnerabilitymanagement and security testing practices and methodologies.
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
jobsearcher.com/blogHow to Write a Recommendation Letter for a StudentWhen a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
jobsearcher.com/blogRecruiting in a Tight MarketAs a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
jobsearcher.com/blogHow to Build a Candidate PersonaA candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
jobsearcher.com/blogHow to Get Into The Trades: Step-by-Step GuideGetting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
jobsearcher.com/blogHow do Good Interviewers Prepare for Interviews?Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.