- UpvoteDownvoteShare Job
- Suggest Revision
Job Title: Information Security Engineer / Cyber Security Engineer. Help cultivate an information security aware and conscious culture. Cyber Security and IT Certifications are a plus (but not required) such as: GIAC, SANS, OSCP, PNPT, CCSP, CEH, CISSP, CISM and so forth.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In compliance with the Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act (Clery Act), each year the University of Arizona releases an Annual Security Report (ASR.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or Web Application Penetration Tester (WAPT) certification.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence.
Full-timeExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work closely with all levels of personnel, including system administrators, Information System Security Officers (ISSOs), and Authorizing Official (AO), to support FISMA systems through the Security Assessment & Authorization (SA&A.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Director of Information Security Risk and Operations is a key enterprise role, reporting directly to the Chief Information Security Officer, for AllianceBernstein helping advance the overall cybersecurity program for the firm, responsible for identifying, evaluating and reporting on information security risks, overseeing cyber operations, threat & vulnerability management, and 3rd party security evaluations.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of Federal Information Security Management Act (FISMA), FEDRAMP, National Institute of Standards and Technology (NIST) Special Publication (SP) 800 Series and Federal Information Processing Standards (FIPS.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
URBN is seeking a highly skilled Information Security Manager. Title: Information Security Manager. Experience with security tools such as SIEM, IDS/IPS, endpoint protection, and threat intelligence platforms.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The IT Security Manager is responsible for developing and implementing security strategies, policies, and procedures to protect the information systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction.
$98,500 - $122,000 a yearFull-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Own your career as a Information Security Specialist at GDIT. Here, you’ll have the opportunity to build strong lines of cyber defense using cutting-edge technologies. Our work depends on Information Security Specialist joining our team to support our Department of Defense (DoD) customer in multiple regions of the Continental United States (CONUS.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Primary advisor to the Site Facility Security Officer (FSO) on all classified information systems security matters and liaison to the local Defense Counterintelligence and Security Agency (DCSA) Information Systems Security Professional (ISSP) on all matters pertaining to classified information systems.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
M.S in information assurance (or related technical field) with minimum of 7 years’ experience with enterprise security topics (incident response, IAM, risk, vulnerability management, cyber intelligence, security architecture, insider threat, supply chain risk management, DR/BCP, others.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional security management certification, such as a Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials, is desired.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Works closely with Information Systems Security Manager (ISSM) to ensure annual FedRAMP and CMMC compliance. Working knowledge in the application of information security concepts, principles, and practices.
RemoteExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Supervisor assists the Chief Information Security Officer in establishing and maintaining a corporate wide information security program to ensure that information assets are adequately protected.
ExpandApply NowActive JobUpdated Today
information security jobs Title: scrum master Company: Change Healthcare
FEATURED BLOG POSTS
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.