- UpvoteDownvoteShare Job
- Suggest Revision
Experience in multiple security domains, such as application security, network security, operating systems, and vulnerability management with a special focus on identity and access management and encryption.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
You are a tool maker, a system hacker, and a math nerd all in ONE. Your typical day involves prototyping a top-conference research paper, debugging and profiling in hexdecimal, or writing updates to coordinate asynchronously with tens of engineers in the open.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Director of Information Security Programs will focus on managing risk for the cybersecurity program at Invenergy, bringing project and program management expertise to the management of cyber security programs, policies and compliance.
$213,675 a yearFull-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
This position will also work closely with Security Architecture, the CISO, Cybersecurity Governance Committee and other RUSH leadership to ensure the IAM program meets the maximum levels of information security while balancing the access needs of the organization.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Building the Brand: Educate customers on Lush brand values, and articulate our position on Fighting Animal Testing, Freshest Cosmetics, Ethical Buying, 100% Vegetarian, Handmade, and Naked Packaging in the shop and through community engagement, hosting store parties, and other traffic-driving initiatives.
$17.22Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Four (4) years as an analyst in Information Technology (IT) Networking or Security or directly related experience is required or + An equivalent combination of education and/or experience is required.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Security Operations and Architecture function includes the Security Incident Response, Vulnerability Management, and Information Security Architecture teams. Experience working with tools related to Threat hunting, data protection, Security Posture Management, and Attack surface management.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Purchase, maintain and monitor security cameras and alarm systems. Schulte Hospitality Group is seeking a dynamic, service-oriented Security Guard to join our team! Minimum of two (2) years in Security role.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Cloud Security Professional (CCSP.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Prior experience as a systems or network engineer desired Prior experience with vulnerability management and security remediation desired Detailed experience with operating system control framework such as CIS Benchmark or STIG desired Requires working knowledge of security controls and standards for a variety of technologies including networking, operating systems, Cloud Security, DevOps, and Security Testing.
$160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implement core cloud security capabilities such as identity & access, data protection, security controls and compliance, vulnerability management, threat detection and response, and logging/monitoring.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Masters Degree in Information Systems or related field and ISACA, SANS, ISC(2), or CEH Certification or related security certification. Bachelors Degree in Information Systems or related field and one (1) years of experience in security systems technologies and ISACA, SANS, ISC(2), or CEH Certification or related security certification OR.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Security Officer is an integral role in ensuring safety and security for all associates, guests and assets. Having full knowledge of the property’s activities/events each shift and providing a professional security presence while focusing on customer service.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications: Relevant certifications in IT and Cybersecurity (e.g., CompTIA Security+, Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Mainframe Security Operations Engineer is responsible for implementing and operating the overall Broadcom Top Secret Security (TSS) system. Broadcom Top Secret Security system experience.
$97,600 a yearFull-timeExpandApply NowActive JobUpdated Today
ethical hacker jobs Title: security in Chicago, IL
FEATURED BLOG POSTS
Decline a Job Offer Professionally: When to Rescind
Your job search has finally paid off! After countless job applications, numerous emails, and several interviews, the hiring manager and other stakeholders have decided that you’re the right person for the job! All you have to do now is accept the offer and walk into the sunset, right?
Resume Job Description Samples - 8 Tips to Follow
When looking for a job, your resume becomes a crucial element. From making a great first impression to showcasing all your achievements and potential, your resume has to portray your professional story in minutes.
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.