- UpvoteDownvoteShare Job
- Suggest Revision
Implement an efficient solution for IT asset management that preserves assets, information security, and control structures. The Director will ensure optimal performance and alignment with TSO's IT strategy, provide and support systems that support all core internal IT systems such as Microsoft Office 365, Zoom, DUO, JAMF, and Tableau, and maintain machine images, group policies, and asset inventory, maintain current systems and firewalls, and ensure IT security by adopting best practices.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Chief Information Security Officer (CISO) is responsible for developing, implementing, and managing the organization’s security vision, strategy, and programs. Technical Background: Deep understanding of information security, risk management, and compliance.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Monitor information security alerts, triage, mitigate, and escalate issues as required. Continuously review and develop the security framework, information security policies, processes, and guidelines.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Entregamos a combinação perfeita entre tecnologia e serviços aos nossos clientes, para que cumpram os desafios dos seus próprios clientes e do seu negócio.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Any experience with the following is useful too: Cisco Data Center Nexus, Cloud, Cisco ASA/PIX, Cisco Secure, ACS, Cisco ACI, Cisco IronPort, Checkpoint FW-1 and NG, Juniper Netscreen and SRX, Palo Alto, Bluecoat, and Fortinet security hardware/software products.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Implementing and managing a robust program to ensure adherence to these requirements is a cross-functional effort requiring an experienced Information Security Manager. As the Information Security Manager, you will.
$175,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Advisor function possesses a combination of skills including industry recognized certification (CISSP), general security expertise, and project management skills.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
You can stand out - and thrive - here, too, as a Mobile Patrol Security Officer. Whelan Security of California, Inc. You have at minimum six plus months of mobile patrol security experience.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Certifications:GIAC Advanced Penetration Tester (GPEN)Offensive Security Certified Professional (OSCP)Offensive Security Exploit Developer (OSED)Offensive Security Exploitation Expert (OSEE)Offensive Security Web Expert (OSWE)CompTIA PenTest+Certified in Risk and Information Systems Control (CRISC)Certified Information Systems Security Professional (CISSP)Certified Information Systems Auditor (CISA.
$70 - $75 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitor information security alerts, triage, mitigate, and escalate issues as needed. Review and development of security framework, information security policies, processes / procedures and guidelines on an ongoing basis.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This position will report to the Amazon Corporate Security, Prototype Security Investigations Manager. The Prototype Security Investigations team (PSI) aims to mitigate unauthorized intellectual property (IP) disclosure, prototype device loss and theft, and non-compliance with the Acceptable Use Policy.
$143,100 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with Cisco Data Center Nexus, Cloud, Cisco ASA/PIX, Cisco Secure, ACS, Cisco ACI, Cisco IronPort, Checkpoint FW-1 and NG, Juniper Netscreen and SRX, Palo Alto, Bluecoat, and Fortinet security hardware/software products is useful.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
One or more security certifications: CEH, Security+, GSEC, GCIH, OEM Certification Cisco, F5, Imperva etc. Network Security (multi-vendor) experience - Cloud security (Native security controls in AWS / Azure / GCP) & security tool implementation in cloud platform.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cruise's Network Access Engineering team is seeking a Staff Network Security Engineer to help us architect, build and operate secure, scalable access networks across our growing global footprint of facilities.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Positions in this classification are responsible for developing, administering and evaluating the operations of a major division of the Information Technology Department, such as applications development, business systems support, business intelligence/report writing; or infrastructure support, IT security; or portfolio / project management; and customer service.
Full-timeExpandApply NowActive JobUpdated Yesterday
Title: information security Company: Caltech in Menlo Park, CA
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.