- UpvoteDownvoteShare Job
- Suggest Revision
Key information security functions and activities include architecture and design for NCR information security controls, developing and enforcing policies and standards, security awareness training, risk management, assessment, and testing, monitoring and metrics, incident management, threat intelligence and vulnerability management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Domain knowledge for the following cybersecurity capability areas: Application Security, Vulnerability Management, Data Security and Protection, Cloud Security, Infrastructure Security, Identity and Access Management, Cyber Threat Operations, Cybersecurity Testing.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security principles relating to, IAM, DLP, SDLC, IT asset management, secure architecture and Incident Response. As a key member of the enterprise risk management team, the Senior IT Security Engineer leads secure platform engineering efforts, focused on the secure development, and operations of our banking and cloud-based environments.
Full-timeRemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of Identity and Access Management (IAM), Cryptography / Key Management, Access Controls and Security Protocols, secrets modernization, secrets management e.g., Multi-factor, SAML, OAuth, OIDC etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple information technology and security technologies: IIS, SQL, firewall, IPS/IDS, Windows, Linux, Anti-Virus, mail filtering, WAF, encryption, CA authority, IDM/IAM, multi factor authentication, SSO, VPN, Zero Trust Technologies, Vulnerability Management, DDoS, SIEM, FIM, WIPS, MDM, Pen Testing, VMware and VM server platforms.
Full-timeExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication.
$170,810 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Senior Consultant in our Cyber Application Security team, you will be responsible for delivering Oracle Cloud Applications Security & Controls implementations and Risk Management Cloud (RMC) modules.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH)3. Proven experience in vulnerability management, third party risk management, and data protection within the banking or financial services industry.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess, in principle, an understanding of the major subsystems such as JES, CICS, MQ series, DB2, IMS, Datacom, and IDMS. Possess, in principle, an understanding of enterprise security managers such as ACF2, TSS, and RACF.Acts as a consultant in studying and recommending actions on various technical areas regarding infrastructure management, providing guidance to customer management and technical resources.
$135,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Pro-actively engage Internal Audit, SOX, Compliance, Information Security, Supplier Risk Management, Business Continuity, and other assurance functions to support an integrated approach to risk management.
$90 an hourExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Application of computer skills including processes involved in installation, configuration and removal of server and client software especially as it relates to COMSEC (security of classified materials and communications)custodial duties; troubleshooting, identification and corrections of computer related problems; industrial security processes and practices; records management; application of government security requirements and policies.
$73,016 a yearFull-timeExpandApply NowActive JobUpdated 29 days ago - UpvoteDownvoteShare Job
- Suggest Revision
As the Enterprise Security Service Director, you will lead critical functions including vulnerability management, penetration testing, and business continuity planning. Penetration Testing & Red Team Program: Lead and manage penetration testing initiatives to identify security weaknesses before they can be exploited.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and implement security controls for cloud environments, including identity and access management, data encryption, data loss prevention (DLP), vulnerability management, and threat detection.
$185,000 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security-managed services include vulnerability management, security awareness training, monitoring, detection, and response (MDR) services tied to 24x7 SOC. To be successful, you should have the ability to manage multiple accounts concurrently, develop cyber security sales strategies, and support new business opportunities, including defining/qualifying sales opportunities, determining engagement needs, and facilitating the articulation of potential solutions based on the client requirements.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Founded in 2003, iParametrics is a recognized leader in emergency management, homeland security, cost estimating and data analytics for federal, state, and local clients, including the Department of Homeland Security (DHS), the Federal Emergency Management Agency (FEMA), the Department of Energy (DOE), the Department of Defense (DOD.
$175,000 a yearFull-timeExpandApply NowActive JobUpdated Today
security management jobs in Atlanta, GA
FEATURED BLOG POSTS
10 Importancies of Setting Realistic Goals
We’ve all heard how important it is to set professional and personal goals. Developing and establishing goals keeps us motivated and moving forward in life. But not all goals are created equal. If you’re chasing goals that are too lofty, you’ll end up disappointed when you cannot reach them. Setting goals that are achievable and measurable is the key to success.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.