- UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Specialist role will work as a mid-level Network Security Engineer and report to the Information Security Team Leader. It's an exciting time to join Fisher Investments; we're continuing to invest in the future of our firm's technology and information security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Solution Specialist, Microsoft, Partner Manager, Channel Manager, Account Executive, Business Development, Account Management, Account Manager, B2B, B to B, Client Relations, Solution Selling, IT Services, Cross-selling, Microsoft, Software, Service Delivery, Information Technology, SharePoint, Dynamic CRM, Business Intelligence, Data Analytics.
$155,000 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Overview:Xerox Corporation is an information services technology company that has continually redefined the workplace experience for more than 100 years is currently seeking a Managed IT Support Specialist who will be responsible for providing technical assistance and support related to computer systems, hardware, and software to Xerox IT Managed Services customer and peers; administration and support of PCs, laptops, mobile devices, printers, servers, and other related equipment.
$42,180 - $84,360Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Network Security Specialist is responsible for implementing security designs, compliance and operation of security infrastructure and processes for both Information and Operations Technology (IT/OT) environments.
$140,589 a yearFull-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Softrams is a Maryland and Virginia-based small business information technology, consulting, and solutions provider specializing in emerging technologies for UX/UI, mobile apps, DevOps, big data analytics, data science, and cyber security.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant certifications in cloud governance and security (e.g., AWS Certified Solutions Architect, Azure Security Engineer, Certified Cloud Governance Specialist). Master's degree in Computer Science, Computer Engineering, Technology, Information Systems (CIS/MIS), Engineering or related technical discipline, or equivalent experience/training.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyzing short, medium, and long-range projects for solutions of complex operational or policy issues in areas such as information security, information security reporting, systems development life cycle, quality assurance, etc.
Part-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Professional certification such as Certified Public Accountant (CPA), Certified Internal Auditor (CIA), Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional.
$35 an hourExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Preferred, Related certifications in Technology, Information Security/Information Risk Management disciplines. Preferred, CISM (Certified Information Security Management.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Operations Center | SOC | Cybersecurity | Network Security | Incident Response | Cloud Security | Compliance | Threat Analysis | Information Technology. As a Security Operations Center (SOC) Specialist, you will play a crucial role in ensuring the safety and integrity of our client's technology platforms.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Advanced certifications like Certified Information System Security Specialist (CISSP), Certified Information Security Auditor (CISA), or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvote
Information Technology Security Specialist - Hybrid in Pittsburgh, Cleveland, Birmingham, Or Phoenix
Share Job- Suggest Revision
Position Title : Security Specialist - Contractor to Hire. Security Administration is specific to ACF2 - Other than training on OIM, mainframe naming conventions and standards for the rules and userIds, the candidate will be analyzing ACF2 access reports for an application in order to board the access to our Identity tool, OIM. The candidate must be able to talk to the stake holders about the access in place and start the conversation about how to find user/access commonalities and how they can be boarded to oim via entitlements.
Full-timeExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Na Ali'i is seeking to hire a Technology Specialist II to work as a member of the Defense Advanced Research Projects Agency (DARPA) Information Technology Directorate (ITD) Software-Defined Wide Area Network (SD-WAN) Tech Refresh Technical Implementation Team. A successful candidate will be responsive, have excellent communication skills (verbal, written, and listening), be a team player, promote consensus, embrace learning, and be a consummate problem solver.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
This specialist will lead and/or participate on examinations for information security and cybersecurity, including assessing business resiliency and third-party risk management. The IT Cyber Examiner / Risk Specialist will conduct Information Technology (IT) and Cybersecurity risk management examinations primarily for financial institutions (FIs) and service providers (SPs) under our supervisory authority.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Technology Specialist is responsible for providing technology delivery risk management and oversight-related support. Analyze and provide recommendations for the maintenance of Technology risk taxonomy and other Enterprise Risk framework elements, as needed, to support compliance with Comerica's risk management policies, standards, and processes.
Full-timeExpandApply NowActive JobUpdated 12 days ago
information technology specialist security jobs in Dallas, WY, Canada
FEATURED BLOG POSTS
How Long Do Background Checks Take for Pre-Employment
Many jobs require a background check. For some companies, this is a matter of company policy. In other jobs, such as finance, childcare, and security, the government often requires background checks. While there are varying levels of intensity, for most people, a background check is nothing to worry about. In fact, the biggest question is often how long does a background check take? Here’s what job seekers and applicants need to know about background checks before they apply to new jobs.
The Best Remote Jobs: Where & How to Find Them
The Covid-19 pandemic hasn’t been easy on any of us, but if there’s one silver lining, it’s the fact that remote work has grown in popularity because of it. Companies that previously weren’t open to their employees working remotely were suddenly forced into allowing it. Since then, they've realized that much of their workforce is happier and more productive. Naturally, this has led to more remote job openings, which is great if you’re interested in this type of position. Read on to learn more about the best remote jobs and where to find them.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.