- UpvoteDownvoteShare Job
- Suggest Revision
The Information Technology Service Management (ITSM) Analyst is responsible for providing ITSM support to several business units across the Family of Companies business units. Support/Maintenance: Functions as a technical expert for GSOC ITSM platform; manage testing and release of a full range configuration changes; Perform system patching to maintain an up-to-date and secure environment; Use the ITSM platform to support asset management, change management, network management, incident management, and contract management programs.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for adjunct faculty who can teach Graduate and Undergraduate courses in Information Systems and Technology (General IT, Software Development/Programming/Software Engineering Management, Data Management/Cloud Administration/Database, IT Project Management/Information Systems Management, Networking/Network Administration/Enterprise Network Management, Cybersecurity/Information Assurance/IT Security/Computer Security or Forensic Management.
Part-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information technology, automated information systems, unique identification (UID), and standard common practices and processes for procurement and management of accountable government property are maximized.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This work adheres to direction from applicable governance areas such as Enterprise Risk Management (ERM), Enterprise Compliance & Ethics (ECE), Enterprise Third Party Risk Management (ETPRM), and Information Security.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
What You'll Bring (Experience & Qualifications) You Bring: Bachelors or Master degree in mathematics, natural sciences, information technology, business management, or relevant field 2+ years of practical experience in IT/ERP consulting, professional software development, or IT project management with a focus on one or more of the following: SAP Salesforce Oracle (Financials, NetSuite, Fusion, JD Edwards, PeopleSoft, etc.
Full-timeExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of commercial enterprise-level tools and products to provide network services, including firewalls, IPS/IDS, DNS, DHCP, web security, TACACS+, VPN and NAC. Our client provides a full range of services including web portal providing information on the state, business and economic development, public safety, Learning, law, justice, health, education, Corrections, transportation, IT, Social Services and culture.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 10 years’ experience developing or leading Enterprise Risk Management, Information Security, Audit, Compliance, Business Resilience, and/or IT Governance functions.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Qualifications REQUIREDBachelor’s degree in health sciences, public health, healthcare administration or related field or Certified Medical Assistant (CMA) certification and five (5) years of experience in ambulatory settingCertified Professional Coder (CPC) or Certified Risk Adjustment Coder (CRC) credential.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implement or improve ICS security management processes at the client’s organization. Knowledge of building management systems (BMS), electrical power management systems (EPMS), physical security OT solutions (IP cameras, NVRs, badge readers etc.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Network Performance Assessment: Assesses network performance to ensure that it meets the present and future needs of the business. Provides network planning recommendations to management.
ExpandApply NowActive JobUpdated 30 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Technology Group (ITG) comprises of Business Applications, Network & Operations, and Information Technology divisions; we support all business functions of Blue Yonder by focusing on building efficiencies in all processes.
Full-timeExpandApply NowActive JobUpdated 22 days ago - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of experience working in USG preferably with NSA or in a CFIUS related agency or Consulting National Security or Risk Mitigation Practice Compliance professional and/or Information Security or a related field, either in professional services or industry.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The GSOC Supervisor is an experienced professional who has expertise in managing people, process and technology in the control room environment, including: shift-based team leadership, strategic program oversight, effective communication (writing, speaking and presenting) and policy and procedure development, as well as technical and project management.
Full-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Summary: Responsible for the day-to-day operations of the Security & Parking programs at all WellStar Health System facilities, including the selection and assignment of officers at WellStar hospital locations, training coordination, parking management, management of the security reporting systems and coordination of issues relative to security technology, equipment and alarm monitoring.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth familiarity with other Oracle Cloud Platform services, such as Oracle Cloud Infrastructure (OCI), Oracle Identity and Access Management (IAM), and Oracle Cloud Security. Understanding of security and identity management concepts within Oracle Fusion Cloud Integration.
ExpandApply NowActive JobUpdated Today
network security it information technology risk management jobs Title: engineer vulnerability management in Chamblee, GA
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Into the Heart of the Ukrainian-Russian Conflict
The story of our US-Ukraine connection started when Kevin met Dave. Days away from quitting his last "real" job as a seafood plant manager, Kevin reconnected with a long-lost friend from high school. Little did he know, this long-lost friend was dating his soon-to-be business partner. After meeting Dave through their mutual connection, it didn't take long for the two to start bouncing business ideas off each other. The flow of creativity soon grew into a business partnership that has withstood the test of time.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Why is Networking Important & How to Network Effectively
Even if you’ve worked hard to earn a degree from an impressive school, landing your dream job might still come down to who you know – otherwise known as networking. Lots of qualified candidates might apply for a job, but the person who gets it might very well be so-and-so’s sibling, friend, or kid. Sometimes the only way to get your foot in the door is to know someone.
Why Do Recruiters Ghost and What Can You Do About It?
Once you’ve finally mustered up the courage to find another job, leaning into the job hunt can feel scary and overwhelming. So, it does nothing to help your confidence when your outbox is full of unanswered follow-ups and interview requests. You thought that ghosting only happens on dating apps—so why do recruiters ghost, too? Recruiter ghosting is not an effective recruiting strategy, but sometimes it’s inevitable. How can you overcome such an unfortunate new career trend? Read on.
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.