- UpvoteDownvoteShare Job
- Suggest Revision
Working in close coordination with technical teams and cross-functional stakeholders (e.g., Finance & Accounting, Procurement, Information Security), the IT Asset Manager establishes, enforces, monitors, and continuously improves asset management processes, standards, and controls.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
An Associate's Degree in a field related to computer science, information technology or the area to which the applicant is applying, such as information systems, human-computer interaction, interactive media, software engineering, computer networking, and/or cybersecurity and two (2) years of additional paraprofessional and/or professional IT technical experience or experience related to the area to which the applicant is applying may be substituted for a the required education.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Partner with Teaching and Learning specialists to research, pilot, and implement initiatives that amplify student learning through the robust application of technology. The redundant SAN supports over 100 virtual machines, hosting 15 websites, the school’s proprietary Didax student information system, Exchange email, file servers, load balancers, DNS, and administrative tools.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Sandy Spring Bank is recruiting for a Senior Internal Audit Director for IT and IS. The Senior Internal Audit Director for Information Technology (IT) / Information Security (IS) is responsible for providing strategic direction and leadership, as well as defining and delivering internal audit assurance services for responsible areas of coverage.
InternExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in Information Technology/Security or 10 years of progressive experience in the IT / Information Security space required. Moderate to Advanced knowledge in the following areas: Event analysis leveraging SIEM tools, log parsing and analysis skill set, networking fundamentals, current threat landscape, malware operation and indicators, penetration techniques, DDoS mitigation techniques, IDS/IPS systems, Windows and Unix or Linux, Firewall and Proxy technology, Data Loss Prevention monitoring, scripting, analysis experience, and audit requirements (PCI, HIPPA, SOX, etc.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The CISO, reporting into the CTO, will lead our security organization that is responsible for our product security operations, securing the technology and products, and supporting corporate development, sales, compliance, and IT teams.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our TRC Supervisors assist clients with identifying and prioritizing information technology risk and leveraging process and controls to reduce risk exposure. Our Global Banking consulting practice works with leading banking institutions who depend upon effective risk management, internal audit, and governance over their enterprise-wide information technology programs to achieve their business objectives, comply with evolving regulatory demands, and meet the needs of internal and external stakeholders.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for Assessment and Authorization (A&A) activities for Consular Affairs / Consular Systems and Technology (CA/CST) automated information systems (AIS) and provides A&A support for domestic and oversea deployed systems, as well as A&A activities on Cloud systems (IAAS, SAAS, and PAAS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Desktop Support Specialist (Information Technology Consultant, Career) The purpose of the Information Technology (IT) Division is to provide the technology that empowers SDSU's success.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Rural King Farm and Home Store strives to create a positive and rewarding workplace for our associates.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide information technology security services to the U.S. Army's Ground Vehicle Systems Center (GVSC). Hybrid - The Information Systems Security Officer (ISSO) reports to the Information Systems Security Manager (ISSM) and the Information System Owner (ISO), working under minimal supervision.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree must be in Network Engineering, Systems Engineering, Information Technology or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, Cyber Security, Software Engineering, Information Assurance, or Computer Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are looking for a Chief Information Security Officer (CISO) who will be responsible for providing executive leadership managing data and information risks related to product development, technology solutions, crisis management, governance risk, compliance and data privacy.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
We have an opportunity for a Senior Telecom & Voice Engineer to work in support of SOUTHCOM Cyber Information Technology Enterprise Services (SCITES). GDIT SOUTHCOM Cyber Information Technology Enterprise Services (SCITES) is working to deliver and operationalize information technology (IT) services for all US SOUTHCOM combatant command constructed networks.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional industry recognized Information Technology or Information Security certifications preferred (GIAC, INE, Cisco, CompTIA, Microsoft, ISACA, etc. Minimum 2 years' experience in Information Technology, Information Security, or comparable role required.
Full-timeExpandApply NowActive JobUpdated Today
information technology jobs Company: Emoney Advisor in Granger, Indiana
FEATURED BLOG POSTS
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually workÂ
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.Â