- UpvoteDownvoteShare Job
- Suggest Revision
Additional experience may be in one or more of the following: computer or information systems design/development/installation, programming, information/cyber/network security, vulnerability analysis, penetration testing, computer forensics, information assurance or systems engineering.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
REQUIRED QUALIFICATIONSEducation: College degree in Information Technology or Information Security or equivalentCertification: Requires one or more of the following certifications CISSP, CISM, CRISC, CISA, Security+, EnCE, CEH, OSCP, GIAC. Splunk and Microsoft certifications preferred.
$140,000 - $160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work experience in other Information Security, Privacy, and/or Information Technology disciplines such as software development, help desk, networking, systems administration or similar in conjunction with professional certifications such as CIPP, CIPM, CIPT, CCSP, CGRC, CRISC, CDPSE, CGEIT, CISA, ISO Lead Implementor, ISO Internal Auditor, and AWS Associate or Professional level certifications.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager will handle the project budget and timeline using an enterprise portfolio project management software and coordinating with the Managed Services vendor to ensure that project implementation is on time, under budget, and within scope to accommodate the best value for Department of State Health Services (DSHS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SS&C Intralinks is currently seeking a Senior Information Security Manager, Risk and Compliance, who will be responsible for enhancing security and compliance across both cloud and traditional data center environments.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Position requires knowledge of SharePoint services in maintaining required documentation such as appointment orders, Authority to Connect (ATC) and Authority to Operate (ATO) documentation, library of Army and other regulations relating to Information Assurance, Memorandums of Understanding/Agreement, Tenant Security Plans, Certificates of Networthiness (CoNs), etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide the Authorizing Official (AO) and Program-Information Systems Security Manager (P-ISSM) support of the Risk Management Framework (RMF) Assessment and Authorization (A&A) efforts for the Army Intelligence Enterprise.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Completion of one of the following recognized professional certifications: QSA (Qualified Security Assessor), CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional), SSCP (Systems Security Certified Practitioner), Certified Ethical Hacker (CEH) Education Experience Degree: B.A./B.S. or equivalent experience required.
$75,000ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the general direction of the Chief Information Officer (CIO) for Information Technology Services, the Chief Information Security Officer (CISO) is responsible for MSU's total information security needs and the development and delivery of a comprehensive information security strategy and privacy program to ensure university information assets are adequately protected.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Deputy Chief Information Security Officer (DCISO) supports the Chief Information Security Officer (CISO) in establishing and maintaining the enterprise vision, strategy, and program to ensure information assets and technologies are protected.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with PSO or cognizant security official on approval of external information systems (e.g., guest. Information Systems Security Manager (ISSM) Provide leadership, mentoring, and quality assurance for Cyber Security and Information Technology team members.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Review and refine the information security strategy for HOS, in line with the CISO objectives, including the management of the HOS security organization and optimization opportunities with the Central CISO Teams (Compliance, Security Operations GSOC, Awareness campaigns, Data Privacy), and plan and manage HOS CISO security budget.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Advise the Information System Owner (ISO), Information Data Owner (IDO), Program Security Officer (PSO), and the Delegated and/or Authorizing Official (DAO/AO) on any assessment and authorization issues.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Ethical Hacker, Incident Handling Certification, Certified Information Security Auditor, and formal information security education is desired. This position is both strategic and hands on in developing and delivering IT security standards, best practices, architecture, and systems to ensure ministry wide information system security.
ExpandApply NowActive JobUpdated 2 days ago
information security jobs Title: scrum Company: Eliassen Group
FEATURED BLOG POSTS
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.