- UpvoteDownvoteShare Job
- Suggest Revision
As a Cyber Risk Manager within the Governance and Risk division, you see security as an innovation enabler and differentiator, not a step in the compliance process. Serve as an Information Security Risk Management subject matter expert and advise on best practices in risk reduction through the configuration of cybersecurity tools and platforms.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
One or more (preferred) Cyber Security Certifications including CISSP, one or more SANS GIAC, CISM, CISA, CEH. Prior specialized experience in managing successful cyber investigations, threat detection and incidents within professional services or consulting spanning computer intrusion, ransomware, and national security issues, interviewing persons of interest.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
KEYWORDS: RMF, Risk Management Framework, ICD, Information Assurance, IA, IAO, IAT, IAM, A&A, A+, Network+, Security+, Non-classified Internet Protocol Router Network (NIPRNet), Secret Internet Protocol Router Network (SIPRNet), DISA Security Technical Implementation Guides (STIGs), CISSP, CASP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Responsible for the management and growth of the Voyager IT infrastructure and staff, as well as oversight of 3rd party service providers on day-to-day operational work as well as project-based initiatives.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Web Content Manager will be responsible for delivering web page changes and additions daily and building a tight relationship with the IT department whom supports the CMS, partners with you on web development work, and helps you deliver reliable project plans.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience of vulnerabilities, intrusion detection systems, firewall management, network vulnerability analysis, cryptographic theory and practice, incident analysis and response, software testing and security assessment, malicious code and software exploitation techniques, continuous monitoring and event logging, cyber-crimes, computer forensics analysis and computer crime investigation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidate must have a strong background in all major security domains to include physical security, risk assessment, investigations, travel security, threat management, executive protection, and protective intelligence.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
If multiple sourced candidates successfully complete the 1 Month Evaluation, your Project Fee will be multiplied accordingly 1 Month Evaluation: The Managing Director will be expected to successfully close a fifty thousand dollar+ consulting engagement with a new client within the first thirty days of joining Synergy Management Group.
$100,000 - $250,000ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Director, AML Compliance Modeling Boston, United States of America The Director, AML Modeling is part of the Compliance Analytics team which is responsible for overseeing risk management strategies to prevent, detect and disrupt usage of Bank products and services for the purposes of money laundering, terrorist financing, bribery, corruption and economic sanctions avoidance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of progressive experience in IT sourcing or IT asset management, IT service management, information technology, project management, or other IT management experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In this dynamic position you will interface and collaborate with other Cybersecurity professionals (ISSM's, ISSO's), Security professionals (CPSO's, FSO's), and System Administrators, on overall compliance and configuration change management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The SVP, Information Security Officer provides cyber risk management oversight to all State Street and legal entity businesses globally, sits within the first line of defense and reports into the Global Chief Information Security Officer.
$225,000 - $337,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Independent decision-making, management of vendors/contracts, project management, customer relationship management, and effective communications. The Building Manager is responsible for managing a wide range of support functions and all activities relating to building operations, Museum security, building systems, safety, maintenance and services, and facility budget control.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Leading the configuration of OneStream including but not limited to : Workflows, Data Sources, Transformation Rules, Business Rules and Calculations, Dashboards, Data Management Sequences, Cube / Master Data, System Security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This includes managing providers who can offer cutting edge attack surface management solutions, cyber threat intelligence services and various cyber risk mitigation platforms and tool utilized worldwide.
ExpandApply NowActive JobUpdated Today
risk management it project cyber security jobs Title: manager Company: Tanium in Cambridge, MA
FEATURED BLOG POSTS
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.