- UpvoteDownvoteShare Job
- Suggest Revision
Establishes and chairs a security and data governance team comprised of legal, IT and privacy leaders to guide the organization’s security program and use and sharing of information and data to ensure compliance with applicable laws and regulations, evaluate and anticipate risks with proposed strategic initiatives or projects, and develop mitigation measures where feasible.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Yes Position Details Drug Screen No Background Checks Yes Position Description The Governance, Risk, and Compliance Manager is responsible for developing, implementing and maintaining the State's coordinated security compliance and privacy program that promotes the identification and protection of personal identifying or otherwise confidential information within state systems in accordance with Statewide Policies and Standards.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Information Security Engineer (Vulnerability Management Specialist/Engineer), your responsibilities include assessing risk and running continuous vulnerability monitoring of the environment, including segments requiring FedRAMP compliance.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Under the leadership of the Chief Information Security Officer, this position will have a hands-on role in planning, coordinating, and delivering enterprise security tools throughout the district.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You will also lead information security compliance programs and audits including, but not limited to: PCI-DSS, SOC1, SOC2, SOX, HIPAA, ensuring IT activities, processes, and procedures meet defined requirements, policies, and regulations.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support efforts of status and performance reporting related to information security, compliance risk and controls effectiveness. Experience and knowledge with information security principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Identify DoD, Army, and Federal Information Security Management Act (FISMA) requirements and assist in validating capability compliance. The Cyber Security Operations Lead is a key personnel role responsible for providing comprehensive cybersecurity and Information Assurance (IA) expertise across the ADCNOMS enterprise.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversees the end-to-end third-party risk management process, evaluating security risks, conducting assessments and due diligence, and ensuring ongoing compliance. Leads defining, improving, and maturing enterprise IT security policies, standards, & procedures to ensure the protection of information assets.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate in-depth knowledge of concepts, best practices and controls in a breadth of information security areas/domains; these information security areas include risk management, access control, cryptography, physical security, security architecture and design, network security, application and operations security and compliance/incident management.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Considerable working knowledge of information security technologies, industry trends and best practices in the areas of risk assessment, compliance and vulnerability management 1.
$55 - $74.5 an hourFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Head of Payments Risk Management will build and lead all programs related to appropriate governance and oversight of payments and banking as a service risk, including compliance, enterprise risk, AML/BSA, and information security, with specific emphasis on serving as liaison with corporate leaders in each of these areas to ensure Kotapay’s conformance to FIBT policies and procedures.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior IT Risk Analyst you will lead day-to-day governance, risk, and compliance (GRC) operations related to policy compliance, security requirements governance, and risk management functions.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior IT Risk Analyst you will lead day-to-day governance, risk, and compliance (GRC) operations related to privacy, policy compliance, security requirements governance, and risk management functions.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Program Manager of Enterprise Risk Management (ERM) and Governance, Risk Management, and Compliance (GRC) tools implements strategies that identify, assess, and mitigate risks across the organization.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will assist the Information System Security Officer (ISSO) in assessing program security effectiveness and hardware and network systems' compliance.
ExpandApply NowActive JobUpdated 4 days ago
risk and compliance information security jobs in Phoenix, AZ
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: