- UpvoteDownvoteShare Job
- Suggest Revision
Must have one of the following: - 3 years of experience in 3 of the following areas: · Data leakage/content monitoring and filtering; · Secure messaging/email encryption; · Mobile device security; · Disk, file, device, and database encryption; · Key management/Public Key Infrastructure (PKI); · Data classification, data tagging, data labeling, and privacy policies; · Digital Rights Management (DRM); · Logging, monitoring, and security event management; · Secure information storage.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in computer science, Information Security, or related field 2. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH)3.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our services include air and ocean freight forwarding, contract logistics, customs brokerage, distribution, inbound logistics, truckload brokerage and other supply chain management services, including consulting, the coordination of purchase orders and customized management services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Monitoring of Identity Cloud which helps to administrate services like Application Administrator, Audit Administrator, Identity Domain Administrator, Security Administrator, User Administrator, Identity Domain Administrator, Security Administrator, User AdministratorOperating System Security and access control, data security is the prime objective on the Oracle Cloud Infrastructure (OCI), thus Keys Management System (KMS) knowledge is desirable.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position serves as the liaison between Sales Reps, Information Technology teams, Software and Hardware Engineering teams through installation to system handover of fully integrated security management systems on customer site.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Overview:Xerox Corporation is an information services technology company that has continually redefined the workplace experience for more than 100 years is currently seeking a Managed IT Support Specialist who will be responsible for providing technical assistance and support related to computer systems, hardware, and software to Xerox IT Managed Services customer and peers; administration and support of PCs, laptops, mobile devices, printers, servers, and other related equipment.
$42,180 - $84,360Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in computer science or related field required plus ten years as a full-time, hands- on, technologist and project management. Under direct supervision of the Sr. Director, IT Operations and Logistics, responsible for overseeing and managing all network, voice (VoIP) and collaboration infrastructure systems administration including design, installation, configuration, deployment, maintenance, training and troubleshooting while optimizing system performance and maintaining security standards.
$120,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of multiple lines of commercial insurance is preferred Strong administration skills and attention to detail Computer literacy required: IT packages, MS Outlook, Excel, Word Strong written & verbal communication and interpersonal skills Good time management skills with ability to organize and prioritize work to meet service level requirements and deadlines Team player Ready to step up to new challenges.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the management of a single software system integration project to include overall success of an implementation from inception to installation, including managing project scope, design, deliverables, issue escalation and resolution.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
You have a general knowledge of labor laws, health codes, safe food handling and sanitation, responsible alcohol service, safety and security systems and procedures, and computer operations.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
We have the proven expertise to plan, build, and run successful security programs across Risk Management, Cyber Digital Transformation, Threat Management, Security Operations - Managed Services, and Identity and Data Management.
RemoteExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Leads content building, tuning, and content lifecycle management using a variety of SIEM, endpoint, network, and cloud security tools. The Sr. Security Incident Management and Response Automation Engineer improves security event detection capabilities and leads response automation efforts across diverse security tooling and enterprise operating environments.
$205,000 a yearFull-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Application of computer skills including processes involved in installation, configuration and removal of server and client software especially as it relates to COMSEC (security of classified materials and communications)custodial duties; troubleshooting, identification and corrections of computer related problems; industrial security processes and practices; records management; application of government security requirements and policies.
Full-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct cyber investigations for escalated and challenging computer security incidents using computer forensics, network forensics, root cause analysis and/or malware analysis. Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
ExpandApply NowActive JobUpdated 13 days ago
management computer security jobs in Atlanta, MA, France
FEATURED BLOG POSTS
How to Write a Short Bio
First impressions can be tricky. When meeting someone in person, it’s likely you have an elevator speech. These short, practiced introductions can help you share more about who you are, what you do for work and other facts about you. While this works well in a live, in-person context, there are many cases where professionals “meet” someone via written form - like social media, a resume, or published work. In these cases, your bio works as your first impression. So, here’s a step-by-step guide on how to write a short bio.
How to Conduct a Performance Review (With Examples)
In a world where the smallest mistake can cost your business tens of thousands in lost revenue, your talent is key to keeping your edge on the market and driving growth. However, managing a workforce of any size can be a challenge. Employees come with their own particular skill set, ambitions and flaws. So, it can be difficult to uncover their individual drivers. Not to mention the challenges brought on by the hybrid and remote working models where in-person interactions have become few and far between.
How to Recruit Passive Candidates
Learning to recruit passive candidates is a different ballgame than recruiting active ones. While an active candidate is someone who is currently looking for a new job, a passive candidate tends to be the opposite. Passive candidates are either already working or not looking to work. So, instead of these candidates coming to you, you'll have to find them and reach out to them first.
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.