- UpvoteDownvoteShare Job
- Suggest Revision
Leading the configuration of OneStream including but not limited to : Workflows, Data Sources, Transformation Rules, Business Rules and Calculations, Dashboards, Data Management Sequences, Cube / Master Data, System Security.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Excellent technical knowledge of mainstream operating systems and a wide range of security technologies, such as network security appliances, identity, and access management (IAM) systems, anti-malware solutions, privilege access management (PAM), data loss prevention (DLP), encryption at-rest and in-transit, multi-factor authentication (MFA), end-point-security, vulnerability scanning and patch management, automated policy compliance tools, and desktop security tools.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage security controls such as network and host intrusion detection/protection systems (IDS/IPS), identity access management systems (SSO, IdP), firewalls, security incident and event management systems (SIEM), mobile device management (MDM) systems, data classification and loss prevention systems (DLP), secure email gateways, and proxy systems.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The HRIS Analyst will also lead system enhancements, manage integrations, and ensure compliance with data privacy and security standards. The Workday HRIS Analyst is a strategic leader who partners with business executives and management to deliver comprehensive HR support.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and build petabyte scale systems for high availability, high throughput, data consistency, security, and end user privacy, defining our next generation of data analytics toolingWork alongside the global cybersecurity architecture & engineering leadership to develop and deliver capabilities to support Cyber Data Science initiatives both internally and in partnership with detection and response teams, and governance and risk management teams across our CISO organization.
$160,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Implement control systems solutions including but not limited to Identity and Access Management (IAM), Data Loss Prevention (DLP), Anti-exploitation, Next Generation Firewalls, Intrusion Prevention Systems (IPS), Network Access Control (NAC), Public Key Infrastructure (PKI), Virtual Private Network (VPN), Malware Analysis, and Application Whitelisting.
RemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications (CISSP, GIAC, CISM, CCSP, CISA, CRISC, SAFe Product Management, AWS Security, AWS Advanced Networking Specialty or AWS Solutions Architect) Utilize strong background in Data Loss Prevention (DLP), Cloud Access Security Brokers (CASB), Secure Access Service Edge (SASE), data protection products and practices and customer research and insights to represent the voice of the customer to the engineering team(s.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide effective solutions-oriented legal and regulatory advice globally to senior management in Technology and our various businesses on cybersecurity, cyber resilience, data protection, information security, artificial intelligence, digital client engagement and other technology related issues.
$223,800 a yearExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Candidates must have experience practicing privacy law at a law firm and/or in-house, with extensive knowledge of US state and federal privacy laws (including CCPA/CPRA, VCDPA, HIPAA, COPPA, and BIPA) and the GDPR. - Ideal candidates will also have experience with drafting and reviewing data processing agreements, privacy policies, and security policies, as well as providing day-to-day privacy advice to in-house counsel and start-up executives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preferred Qualifications:Department of Defense Directive (DoDD) 8140 / 8570 Certification requirements (CompTIA Security+ CE or equivalent certification and an Operating System Certification)Experience with NISPOM, JAFAN, JSIG, DFARS and/or DoD/RMFExperience with data storage, NAS, and SAN technologies and solutionsExperience with using Information Technology project lifecycle management processes.
$128,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Apply specialized knowledge in particular non-financial risk domains, and broad acumen across facets of all domains including cybersecurity, technology, cloud, operational resiliency, data, third party, privacy, and product risk.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong skills in developing, testing, and deploying DBT models for data transformation and pipeline management. Data Quality and Compliance: Ensure data integrity, quality, and compliance with data governance and security policies.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience facilitating development of enterprise architecture to support complex IT solution deliverables - Familiarity with data security in health/insurance/financial services application areas, including security architectures, authentication and non-repudiation, cryptography, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will be responsible for selling a best of breed Cybersecurity Platform that spans across our Cloud Security, Identity Security, Endpoint Security, Exposure Management, and Data Lake portfolios to our largest customers.
$204,400 a yearFull-timeExpandApply NowActive JobUpdated Today
management data security jobs in Boston, MA
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
What is Employment Participation Rate
According to economists, there are four factors of production that go into creating higher quality goods at lower prices. These are
How to Get Pay Stubs (From Previous Employee Also!)
Pay stubs are an important piece of document which shows your earnings in a given period, as well as any deductions made towards your health insurance or pension contributions. They’re also excellent for finding out how much your recent salary raise has bumped up your monthly net income.
How to Write a Job Description?
It might be tempting to overlook the importance of a well-written job description. After all, if you’ve posted job ads before and ended up with tons of resumes in hand, it’s easy to assume that this will always be the case, regardless of how your job ad reads. But, in reality, you really can’t take getting an influx of resumes for granted.
How to Get a W2 From Previous Employers
When tax time rolls around, the last thing you want to worry about is having to track down a W-2 from your former employer. Many times you won’t have to because the IRS requires companies to send these forms to all current and former employees who have earned more than $600 in the last year. Unfortunately, there are employers who don’t do what they’re supposed to. There are even times where something else may happen that prevents the W-2 from getting where it’s supposed to go.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.