- UpvoteDownvoteShare Job
- Suggest Revision
PowerPlan is looking for every opportunity to help our customers and prospects gain more value from our suite of software solutions We are looking for a top tier Security Analyst to join our team and help us protect our network and systems from cyber threats.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Coordinates with Cyber Security, Internal and External audit teams to ensure proper functionality, controls maintenance, and compliance of SAP environments. POSITION SCOPE: Working under the direction of the Director, IT Risk Management and Application Security, this position is responsible for the overall security and controls within the global SAP landscape and keeping it aligned with GPI’s security and SOX compliance policies.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Security Consultants will leverage ProArch's security tools to detect and prevent cyber threats to ProArch's customers. Familiarity with industry standards such as PCI DSS, NY DFS, HIPAA\HiTech\HiTrust, DFARS, NIST SP-800 series, CIS Critical Security Controls, OWASP.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Facility Security Officer (FSO) will implement the industrial security program and ensure security requirements are met for the Hermeus facility and program office. Thorough understanding of security databases such as eQIP, NISS. The FSO is responsible for implementing and providing guidance to customers and management on security issues such as security education, insider threat, classified document control, security investigations, classification control and personnel clearances.
$160,000 a yearFull-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple information technology and security technologies: IIS, SQL, firewall, IPS/IDS, Windows, Linux, Anti-Virus, mail filtering, WAF, encryption, CA authority, IDM/IAM, multi factor authentication, SSO, VPN, Zero Trust Technologies, Vulnerability Management, DDoS, SIEM, FIM, WIPS, MDM, Pen Testing, VMware and VM server platforms.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role will directly report to the Chief Information Security Officer of Cox Automotive. Knowledge of Identity and Access Management (IAM), Cryptography / Key Management, Access Controls and Security Protocols, secrets modernization, secrets management e.g., Multi-factor, SAML, OAuth, OIDC etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Customers trust us to provide a portfolio of turn-key systems, products, and services — including two-way radio communications, vehicle uplift, security video and access control systems, BDA/DAS, remote monitoring, GPS tracking, SCADA, dispatch, mass notification, and point-to-point wireless networks.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Associate IT Security specialist will assist with the completion of information security requirements and deliverables related to eDiscovery and Legal Hold requests affecting cloud and on premises identity and access management systems and data storage systems.
Full-timeExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least one of the following certifications with combined experience: CISSP, CEH, GCIH, GCFA, Security+, OSCP. Proficient experience working in cybersecurity operations and incident response, to include utilizing Security Information and Event Management (SIEM) platforms, Intrusion Detection/Prevention Systems (IDS/IPS), and Vulnerability Management and Threat Intelligence applications.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Lead incident response efforts in the event of a security breach or cyber-attack. Monitor network traffic for potential security breaches or cyber threats. Experience in implementing and managing security tools such as SIEM, SOAR, EDR/XDR, NDR, NAC, DLP, Firewalls, IDS/IPS.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
$263,200 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Ability to obtain a Public Trust Security Clearance Suitability (To be eligible for Public Trust Security Clearance, one must be either a U.S. Citizen OR a U.S. Permanent Resident/Green Card holder who has resided in the U.S.A for the past 3 years of the past 5 years consecutively with no breaks.
$183,300 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Possessing experience with Oracle Cloud role design across functional (ERP, EPM, OTBI) and technical (e.g. - Security Console, Setup & Maintenance, OIC) domain areas; Possessing experience with Oracle Security, Controls and RMC Advanced Access Control (AAC.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Capital One’s Offensive Security Purple Team reduces cyber risk by uncovering vulnerabilities and weaknesses in the enterprise cyber environment by conducting covert/overt adversary simulation and emulation.
Full-timeRemoteExpandApply NowActive JobUpdated Today
Title: cyber security Company: Areti Group in Atlanta, GA
FEATURED BLOG POSTS
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.
Operations Job Titles for Entry, Mid, and Senior-Level Positions
An operations team can take on many functions within a business. With wide-ranging responsibilities come wide-ranging job titles. This means that you have to be more vigilant in your job search. On one hand, the perfect job might be hidden under a title you might not expect. Meanwhile, operations titles that you’re used to looking at may mean something different at a given organization depending on their structure.
How to Automate Your Job Search
The internet is ripe with career professionals urging you to be aggressive in your networking and application strategies to land a job. But at what expense? Your sanity? Peace of mind? Energy? Free time? When the job search gets overwhelming—as it inevitably will—leverage automation to take the most tedious tasks off your plate. Here are seven ways to do it.
How To Request Accommodations at Work (According to Someone Who’s Done It)
Doing a job for eight hours a day, five days a week is exhausting for anyone. But for those with a disability or chronic pain, it can be especially taxing—something must change. Asking for reasonable accommodations at work can feel tricky, especially if you’re new to the job. Under the Americans with Disabilities Act (ADA), physical disabilities, health conditions, and symptoms of mental health are all valid workplace accommodations. When you request accommodations, it means that your condition is impacting your ability to perform at work.