- UpvoteDownvoteShare Job
- Suggest Revision
Program Introduction 9th Way Insignia Technology is looking for a Jr. Computer Systems Engineer/Architect to join our team and assist in providing Information Technology Program Management and technical support (i.e., development, operations and maintenance) to the Department of Veterans Affairs, Benefits and Memorial Services (BAM) Portfolio.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Conduct formal risk analysis and self-assessments program for various ExamWorks brands and the associated information services systems, processes, and infrastructure. Certified Risk and Information Systems Control(CRISC) or Certified Information Systems Auditor(CISA) or Certified Information Security Manager(CISM.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated advanced knowledge of cyber security operations with mastery of one or more of the following: attack surface management, Security Operations Center (SOC) operations, Intrusion Detection/Intrusion Prevention Systems (IDS/IPS), Security Information and Event Management (SIEM) use, threats (including Advanced Persistent Threat (APT), insider), vulnerabilities, and exploits; incident response, investigations and remediation.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
One or more current information security certifications such as Certified in Risk and Information Systems Controls (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or Certified Information Systems Security Professional (CISSP.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop, implement and monitor a strategic and comprehensive enterprise information security roadmap and IT risk management program. Expertise in establishing and maintaining a corporate-wide information security management program to ensure that information assets are adequately protected.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This individual will be responsible for executing on the operational security program, overseeing Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, and the Cyber Threat Intelligence program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Actuarial Science, Business Administration/Management, Commerce, Computer and Information Science, Computer Engineering, Computer Programming, Data Processing/Analytics/Science, Economics, Engineering, Engineering and Business, Finance, Information Technology, Management Information Systems, Mathematics, Mechanical Engineering, Operations Management/Research, Risk Management, Software App, Statistics.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Achievement of industry certifications preferred including, but not limited to, PCI Internal Security Assessor (PCI ISA), Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified CyOPS Manager (CISM), and Information Systems Security Management Professional (ISSMP), Certified Risk in Information Systems Control (CRISC.
Full-timeExpandApply NowActive JobUpdated 27 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 1 professional security management or risk management certification: Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Informations Systems Auditor (CISA), Certified Risk & Information Systems Control (CRISC), Certified Information Privacy Professional (CIPP) or Open FAIR Certified.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
TTG FS, LLC provides technical and analytical support services and property management to TIG and its clients, including management of firm-wide Geographic Information Systems (GIS) and Forest Management Information Systems, administration of TIG’s global timberland inventory program, administration of related databases, maintenance of TTG FS’ cloud environment, property management services and harvest scheduling and sustainable resource planning.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Ensure that the company's risk management program is integrated with the information security and compliance programs and clearly communicated to leadership teams. The CISO function works closely with many departments across PagerDuty including products, engineering, legal, sales, compliance, IT, and internal audit to manage identified risks and partner to mitigate vulnerabilities in software, systems, architecture, processes and practices.
$200Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Five to 10 years’ experience implementing RCM, CbM/PdM methods, operating building automation and energy management systems, and thorough understanding of asset management, data analytics, and capital planning approaches.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee assigned FO's GTRI Information Systems Program, including but not limited to insider threat awareness, mitigation of system vulnerabilities and threats; information security/cybersecurity policy and process development and implementation, network security, program control, compliance with government and contract requirements, and configuration management (CM) of all associated software, hardware, and security relevant functions.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems.
Full-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for developing and maintaining the technical IT / cyber security capabilities necessary for safeguarding the firm's information systems and applications (software development lifecycle.
ExpandApply NowActive JobUpdated Today
program management information systems jobs Title: analyst in Atlanta, IN, Arkansas
FEATURED BLOG POSTS
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.