- UpvoteDownvoteShare Job
- Suggest Revision
Minimum 7-10 years of experience in cyber security, anomaly detection, Security Operations Center (SOC) detection, threat analytics, security incident and event management (SIEM), information technology (IT), and operations incident response.
$101,254 - $174,645 a yearFull-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong analytical and troubleshooting skills - CEH, GCIH, or relevant IT technology certification - Examples of other certifications include: - CERT Certified Computer Security Incident Handler - ECC CEH (Electronic Commerce Council Certified Ethical Hacker) - GCIH (GIAC Certified Incident Handler) - GISF (GIAC Information Security Fundamentals) - CISSP (ISC2 Certified Information System Security Professional) - Additional certifications at an equivalent may also be considered.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Chief Information Security Officer (“CISO”) leads the Bank’s second line of defense (“2LoD”) Business Continuity, Corporate Information Security, Cybersecurity/Information Security Risk, GLBA Compliance, Incident Response, Privacy, and all related information security monitoring Programs.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Logs all service desk email requests into Incident Management System (ServiceNow) Logs all service desk calls or email requests into the Incident Management System (ServiceNow), assign, update, and resolve incidents as needed.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
One or more of the following domains: secure IT operations, data security, incident response, security engineering, network security, systems security, or vulnerability management. Demonstrated experience in one or more cybersecurity domains (such as secure IT operations, data security, incident response, security engineering, network security, systems security, or vulnerability management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Incident Response and Recovery: Use Microsoft Azure Site Recovery to ensure effective disaster recovery and backup solutions. Qualified candidate will also possess good knowledge of computer programming languages, computer system analysis, and network infrastructure.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
4-6 years Understanding of Incident, Problem, Change, Knowledge, Event, and Configuration Management, and correlated functionality in ServiceNow. As necessary, acts as a backup for the Application Support Manager during critical incident management procedures.
$94,400 - $176,800 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Examples of audit subject matter includes configuration management, incident and problem management, IT asset management, IT change management, service continuity management, IT vendor management, Operating Systems, SQL and Oracle Databases, Network devices (firewalls, routers, etc.
$111,408 - $189,738 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The EHS Director has responsibility to anticipate EHS issues, assure risk management processes are applied, coach capabilities into the regional teams, analyze incident data, and develop actionable solutions.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
BCMC provides remote and onsite advanced technical assistance, proactive hunting, rapid onsite incident response, and immediate investigation and resolution using host-based, network-based and cloud-based cybersecurity analysis capabilities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Create security incident communications on behalf of the IT Operations Manager for distribution to IT Management and external business customers. Participate in security incident management.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Phia, LLC is a Northern Virginia-based, small business established in 2011 with a focus on Cyber Intelligence, Cyber Security/Defense, Intrusion Analysis & Incident Response, Cyber Architecture & Capability Analysis, Cyber Policy & Strategy, and Information Assurance/Security.
$150,000 - $180,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role executes the various core functions of the GSOC to include, but not limited to incident recognition/escalation, intelligence analysis, emergency response, product security, and physical security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At least 6 years of experience leading or conducting cyber technical investigations utilizing one of the following digital forensics and incident response tools EnCase, FTK, Axiom, X-Ways, or Cellebrite.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Project Description and Background This project aims to address critical IT Service Management needs for WSDOT, focusing on asset management, incident management, change management, customer self-service, and IT service desk modernization.
Full-timeExpandApply NowActive JobUpdated Today
incident job Title: consulting of technical staff Company: Oracle
FEATURED BLOG POSTS
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
How to Recruit and Retain Gen Z Employees
As Boomers and the oldest Gen X are exiting the workforce, younger Millennials and Gen Z are flowing in. While the younger generations seem to be completely different than the older generations, many care about some of the same things- financial security, working conditions, etc. However, due to social and cultural differences in the era that Gen Z has grown up in, they have concerns that were never even workplace topics of discussion 20 years ago.
Explore Your Skill and Find the Best Way to Make Money From Home
When you just can’t stomach another drive-thru coffee on your morning commute, close your navigation app on your phone and search for easy ways to make money from home instead. With a computer and some niche skills, there are countless opportunities for you to earn a living from your couch. (Okay, fine, your home office.) Below, we’ll explore 30 different ways to make money from home, as well as a few “too-good-too-be-true" warning signs to know to keep you from booking the wrong remote gig.