- UpvoteDownvoteShare Job
- Suggest Revision
Will report to the Identity and Access Management Manager and support Information Security to provide the highest quality service to JM Family Enterprises business units and customers. The IAM Architect performs daily functions required to maintain the standards and controls for Information Security to protect JM Family’s information assets, works with critical and sensitive information, and is relied upon to maintain security and least privileged safeguards.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and enhance the application of the information security management framework, in MSC Cruises USA collaborating with the Corporate Cyber Security department. Presenting regular feedback reports on the cyber security projects of MSC Cruises USA to the Corporate Cyber Security Department and to the Chief Information Security Officer (CISO.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Hands-on experience with two or more of the following: data loss prevention technologies, incident response and remediation, network security services, ethical hacking and vulnerability scanning, firewall, application code scanning and intrusion detection technologies.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong understanding of information technology controls and security experience in a widely used financial application (SAP, Oracle, JD Edwards, PeopleSoft, etc.) Four or more years of experience in business process controls and IT risk management, internal audit, IT security, or other IT compliance related work.
$90,500 - $180,600 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Support and lead a team of security practitioners in various practices such as incident management, application security, vulnerability management, and auditing. Internet security, including: transport security and web application security.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Reporting to the Security Risk and Compliance Office Security Manager, the Security Analyst is tasked with providing technical expertise in all areas of network, system, and application security.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working experience with the following technology vendors and products: Splunk, Tripwire, Rapid7 Nexpose Vulnerability Scanner, Metasploit, Qualys Vulnerability Scanner (Cloud), Delinea Secret Server, Carbon Black Application Protection, Veracode SAST & DAST Technologies.
Full-timeExpandApply NowActive JobUpdated 23 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated experience implementing and/or enforcing security and compliance frameworks such as NIST, PCI DSS, and ISO. The Security Analyst is responsible for departments vulnerability management program, administers the annual cybersecurity assessments and penetration tests, and researches and reports on emerging threats to help the department take pre-emptive risk mitigation steps.
ExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Analyst works closely with the various teams in the infrastructure department to ensure that systems and networks are always designed, developed, deployed, and managed with an emphasis on strong, effective security and risk management controls.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Analyst is responsible for departments vulnerability management program, administers the annual cybersecurity assessments and penetration tests, and research and reports on emerging threats to help the department take pre-emptive risk mitigation steps.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
The Security Analyst is responsible for assisting with the day-to-day operations of securing the departments various information systems. Manage systems owned by the Security Risk and Compliance Office (SRCO.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Description The Security Analyst is responsible for assisting with the day-to-day operations of securing the departments various information systems. Three to five years of experience in a security analyst or related position.
ExpandApply NowActive JobUpdated 3 months ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with compliance (as code) and application security tools such as Cloud Policy (AWS Config/GuardDuty), Sonrai, Prisma, AquaSec, among others. Cloud Security Architect. Understand AWS Cloud security features and best practices (data protection, authentication, RBAC.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Security Manager (CISM) Identity & Access Management, Incident / Anomaly Detection, Network and Application Protection, Data Protection, Incident Response and Compliance.
ExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
If you're seeking a career in vulnerability management, quality assurance, or GRC tools, then Application Security at Deloitte is the offering for you. Our Cyber Application Security team advises federal clients on integrating security activities throughout the software development lifecycle to enable the design, build, and deployment of secure applications.
$88,000 - $155,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 12 days ago
application security jobs in Pompano Beach, FL
FEATURED BLOG POSTS
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.
10 Reasons to Be on Time at Work
Being punctual at work may not be something you’ve given much thought to, but it’s the foundation for building a successful career. All of your technical or job-specific skills will be in vain if your peers and superiors can’t trust you to show up on time and do the work. In fact, Simon Sinek once famously said that
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Email Etiquette Principles - Why is it Important
Why is email etiquette important? Let's imagine you're hiring for a new role, and you’ve just received the email below.