- UpvoteDownvoteShare Job
- Suggest Revision
Act as the Dignity Health Technology Services champion with internal and external stakeholders regarding security, compliance, feature and product roadmaps, remediation, and service level agreements.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The IT Security Manager also acts as an ambassador and subject matter expert for PC’s focus on security, through involvement in project meetings, new technology adoption and security awareness.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We provide innovative and comprehensive services and solutions that span cloud; systems integration and application management; security; intelligent platform services; infrastructure services; software engineering services; data and artificial intelligence; and global delivery through our Advanced Technology Centers.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security: Compliance, Information Assurance, Data Protection using industry-best practices and tooling (Crowdstrike Falcon, Tenable.io, Splunk, HashiCorp Vault signers, PKI and Certificate Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
MCCCD's Chief Information Officer is responsible for all District IT functions, including planning, budgeting, acquisition, allocation of computer services, security, communication services and development; controlling the collection, availability and delivery of vital information technology across all District entities to support the needs of the District, its Colleges and ultimately student success.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2013 by security and risk experts Dr. Alex Yampolskiy and Sam Kassoumeh and funded by world-class investors, SecurityScorecard’s patented rating technology is used by over 25,000 organizations for self-monitoring, third-party risk management, board reporting, and cyber insurance underwriting; making all organizations more resilient by allowing them to easily find and fix cybersecurity risks across their digital footprint.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintain and repair leak detection systems, video surveillance systems such as pan-tilt-zoom and adjustable focus cameras, video conferencing and video visitation equipment, emergency All-Call network technology, medical call systems, etc.
$26.25 - $38 an hourFull-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with and advanced knowledge of cybersecurity technology domains including, SIEM, Network Security, Endpoint Security, Application Security, and Security Operations.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Evaluates and implements security controls to meet or exceed the Federal Information Security Management Act (FISMA), the National Institute of Standards and Technology (NIST) and the Federal Information Processing Standards (FIPS) in "high" information classification boundary.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
15 years of technical leadership experience in Information Security (strongly preferred) or Information Technology. In-depth knowledge of security compliance, technology, and risk best practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Global Security Initiative’s (GSI) mission is to advance transformational capabilities at ASU in science and technology to meet defense, security and intelligence mission needs, through novel research and training experiences.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of NEC, IEEE, EIA, TIA, BICSI industry standards, codes and best practices related to the design of Information and Communications Technology (ICT), low voltage, and telecommunications systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead the design, build, implementation, and delivery of AWS and Microsoft Azure Infrastructure as a Service (IaaS) / Platform as a Service (PaaS) / Software as a Service (SaaS), including compute, networking, security, identity and access management (IAM), backup, monitoring, and data / business intelligence (BI.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IAT Level II Certification (CompTIA Security+ CE, CCNA Security Training,CySA+,GICSP,GSEC) equivalent or higher. The Unix/Linux Administrator will provide services in support of the U.S. Army Network Enterprise Technology Command (NETCOM) on Fort Huachuca.
ExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of following technology stack: Microsoft Azure Active Directory, MicrosoftAzure Service Fabric, Microsoft Azure Networking, Microsoft Azure Cloud Platform,HashiCorp Terraform. - Active involvement in decision making areas such as networking, virtualization, identity,security, business continuity, disaster recovery and governance.
RemoteExpandApply NowActive JobUpdated Today
technology security jobs in Tempe, AZ
FEATURED BLOG POSTS
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
How to Get a Union Job? A Step-by-Step Guide
A union job can significantly impact your job security, pay, and employment benefits. Whether this is your first job or you have years of experience, a union job can offer much-needed protection in a labor market where employees are hired and fired at will.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.