- UpvoteDownvoteShare Job
- Suggest Revision
As part of the second line of defense, it is critical to foster strong working relationships with other leaders in the Lines of Business, Cyber and Technology organizations, and other risk management offices to perform and support evaluations of the firm's risk posture and offer independent advice and recommendations regarding ways to reduce risks.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SVP, Information Security Officer provides cyber risk management oversight to all State Street and legal entity businesses globally, sits within the first line of defense and reports into the Global Chief Information Security Officer.
$225,000 - $337,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Python, R, SAS/SQL, Stata, etc) Very good communication skills (both verbal and written) as well as solid project management skills and ability to multitask. The successful candidate will join the Model Risk Management and Validation Group (MRM&V.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions; internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Interface directly with IT management, Enterprise Risk Management and Compliance to provide audit results and ensure compliance with. Information Systems Internal Audit Manager will assist in the annual risk assessment and corresponding planning process, supervise the pre- and post-implementation project audits, complete SOX Information Technology General Controls (ITGC) testing and cycle audits as needed, and serve as the point of contact for co-sourcing arrangements, perform testing as well as manage the preparation of the internal audit reports.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
O Review of Commonwealth Risk Management Office assessments and recommendations regarding data security risk mitigation. Minimum of five years of design and implementation experience in IT, with a deep knowledge in a minimum of two of the following technical disciplines: infrastructure and network design, application development, application programming interfaces (APIs), middleware, servers and storage, database management, data security, and system administration and operations.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in a command line environment and a general understanding of Red Hat Linux OS, or other Unix-like OS. - Databricks certification - Knowledge of FedRAMP, FISMA and other Federal IT security guidelines.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of IT project management tools; ability to recommend efficient solutions to operations management. Position OverviewWindwalker Group, LLC is seeking a Junior Operations Manager to support the daily operational management of Guard Security, Facilities Protective Services, and Emergency Management contracts.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Equity Derivative Portfolio Manager will work closely with teams across Investment Management, Barings and Enterprise Risk. This high-profile group works across all of Investment Management as well as with our other internal stakeholders including product, actuarial, treasury, accounting, risk, compliance, and external partners, including our primary asset management subsidiary Barings and the major Wall Street derivative broker/dealer counterparties.
$200Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
STR is a growing technology company with locations near Boston, MA, Arlington, VA, near Dayton, OH, Melbourne, FL, and Carlsbad, CA. We specialize in advanced research and development for defense, intelligence, and national security in: cyber; next generation sensors, radar, sonar, communications, and electronic warfare; and artificial intelligence algorithms and analytics to make sense of the complexity that is exploding around us.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Capital One’s Offensive Security Purple Team reduces cyber risk by uncovering vulnerabilities and weaknesses in the enterprise cyber environment by conducting covert/overt adversary simulation and emulation.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate is expected to have proven experience implementing secure coding standards, the Defense Information Systems Agency (DISA) Application Security and Development Security Technical Implementation Guide (ASD STIG), database security, and experience with the Risk Management Framework (RMF) process and artifact development leading to a successful Authorization to Operate (ATO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with Technology Risk and ERM (Enterprise Risk Management) on risk management practices. Maintain strong actionable metrics for all functions, BISO, Product Security and Data Protection, with clear KRIs (Key Risk Indicators) and KPIs (Key Performance Indicators.
$250ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Today
risk management it project cyber security jobs Title: project manager Company: Tanium in Boston, MA
FEATURED BLOG POSTS
How to Effectively Recruit Employees
Today, hiring and retaining talent looks much different than it did only two or three years ago. Financial instability and the strain on our mental health brought on by the pandemic has made everyone more wary and selective of their workplace and employer. Whereas in the past people might have prioritized promotions and financial reward, today they look at other factors such as workplace flexibility, personal fulfillment and values alignment.
How Many Hours is Part-Time vs. Full-Time Work?
Growing up you watched your parents shuffle to and from the office, held hostage to their 9 to 5. If jammed-packed schedules and deadlines sound frightening, you might consider pivoting your search to part-time jobs. In fact, even employers have shifted their preference, selecting more people open to the idea of flexible working hours.
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.