- UpvoteDownvoteShare Job
- Suggest Revision
Establish security, Disaster Recovery, and Technology Risk requirements with our oversight committee to drive reasonable vendors and vendor controls in alignment with our Cyber risk appetite.
$146,698 - $302,662 a yearFull-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Developing risk taxonomy, methodology and framework that can used to assess, communicate and manage cyber risks across IT and non-IT business units. Developing a cyber security risk management service which meets regulatory requirements and aligns with industry leading information security practices.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
40 What You’ll Be Doing Provides senior level support in the development, implementation, and maintenance of the Credit Union's organizational business continuity (BC) and disaster recovery (DR) management programs and plans by gathering, analyzing, and presenting data to mitigate the impact on business operations of potential adverse conditions due to natural or structural disasters, acts of terror/war, cyber-attacks, etc.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will reduce cyber risk by uncovering vulnerabilities and weaknesses in our client’s enterprise cyber environment through coordinated ethical hacking and penetration testing scenarios.
RemoteExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Recognize, mitigate and escalate risk issues such as cyber-risk, product risk, and operational risk. Manage and oversee the implementation process for new business; prepare all documentation and legal agreements ensuring that audit requirements are met to mitigate risk and legal liability; respond to issues related to the implementation, engage business partners and escalate, as appropriate.
Full-timeExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5+ years of experience in information / cyber security and IT risk management (including hands-on experience in implementing, maintaining, and managing on-prem and cloud-based network / infrastructure / application / data security for the enterprise.
$47 - $60 an hourFull-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the department leader, you are accountable for overseeing security protocols and promptly addressing any breaches, whether they pertain to IT cyber security, infrastructure, or building security, ensuring the safety and integrity of our data and operations.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience defining security monitoring rules, monitoring events, assessing risk, responding to incidents, and providing security oversight related to the security features of IT tools supported by the IT operations teams; direct involvement with network and administration skills with Linux, Windows, cloud security, Active Directory, security infrastructure are preferred.
Full-timeRemoteExpandUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of cyber risk. The eCommerce Fraud Strategist is recognized as a thought leader in fraud prevention strategy. They are a highly technical strategist who will demonstrate measurable impact by implementing fraud prevention strategies and reducing fraud related loss.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Deloitte Advisory's Cyber Risk team helps complex organizations more confidently pursue their growth, innovation and performance agendas through proactive management of the associated cyber risks.
$97,613 - $188,375 a yearFull-timeExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
System administration of servers, network devices/configuration (Cisco Meraki) operational enforcement of information and cyber security. As the IT Manager, you'll be at the forefront of our efforts steering asset management, systems access, data classification, and incident risk.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The CSO will be responsible for the planning, organization and direction of cyber risk activities. You will operate proactively and independently overseeing all aspects of cyber risk and security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Cyber Risk Management Engineer will implement enterprise information security solutions, such as authentication and authorization, public key infrastructure, data loss prevention, and security event information analytics, to address the current and emerging security needs of the business.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and conduct cyber risk training - at appropriate levels for employees. Certified Information Systems Auditor (CISA), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Control (CRISC) or equivalent information security certification is desirable.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Assist the Information Security Officer by providing Cyber risk guidance for IT projects, including the evaluation and recommendation of technical controls. The Cyber Security Engineer performs a variety of technical and non-technical functions.
ExpandApply NowActive JobUpdated 2 days ago
cyber risk jobs in Costa Mesa, CA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: