- UpvoteDownvoteShare Job
- Suggest Revision
These projects should be targeted to enable multiple business processes and/or source data systems to drive efficiencies and reduce redundancies supporting one or more of the following functions: internal audit, compliance, enterprise risk management, operational risk management, technology risk management, third party risk management, cyber security, business resiliency, incident management, SOX (and/or other compliance frameworks), or other business programs/initiatives.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
All members of the Division of Public Safety and Security (DPSS) are considered Campus Security Authorities (CSAs) under The Jeanne Clery Disclosure of Campus Security Policy and Campus Crime Statistics Act. As such, you are required to report Clery reportable offenses that come to your attention.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and shape the travel security and threat intelligence program, providing strategic analytical intelligence, informing the executive protection program and contributing strategies, tools, technology and expertise to partner programs (ie; travel, cyber security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
OR Completion of State of Michigan MCOLES certified police academy and (3) years experience in public law enforcement, military police or armed hospital security OR Bachelors degree in criminal justice, security administration or related area with participation in security or law enforcement through an internship or volunteer work such as police reserve program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Receive a greater level of Contract security compared to with an outside agency. Contract Security compared to a contract with an outside agency. The RN Utilization Review Nurse is responsible to facilitating care along a continuum through effective resource coordination to help patients achieve optimal health, access to care and appropriate utilization of resources, balanced with the patient’s resources.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of cloud security controls including tenant isolation, encryption at rest, encryption in transit, key management, vulnerability assessments, application firewalls, SIEM, etc. Must be able to obtain and maintain Top Secret Security clearance.
$86,800 - $157,500 a yearFull-timeRemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Analyst, Forensics and eDiscovery will handle requests for electronic data and digital forensic investigations related to litigation, regulatory matters, compliance, employee investigations, incident response, and cyber security events.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
To ensure success, you should have advanced knowledge of computer and internet security systems, advanced level web application penetration testing skills, and the ability to automate processes, reporting, and governance activities.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
SAP Security Admin ( GRC Access Control) Duration: long-term Location: Dearborn, MI Pay is 65 – 70 Position Description: Senior SAP Security Administrator Skills Required: Experience with SAP authorization concept, role design, user administration, SOX compliance and SOD conflict resolution.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position is responsible for assisting with security operations for Detroit Pistons in various capacities including, but not limited to; visual security inspections, credential verification, walking patrol, incident report writing, basic CCTV monitoring, incident response.
Part-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience dealing with security applications: Security Information and Event (SIEM)/ Log Management, Governance Risk Compliance (GRC), Identity Access Management, IDS/IPS, Advanced Persistent Threat, Vulnerability Management.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Title: Cyber Security Engineer (Software Packaging) Participate in developing and providing operational documentation to ensure a well-managed and mature security infrastructure, security packaging and automation standard.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience as a Product Manager or Product Owner of Infrastructure Technology Products, including Platform Engineering, Google Cloud, Monitoring, Container as a Service, or Security Products (SIEM, SOAR, IAM, XDR etc.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
GIAC Cyber Threat Intelligence (GCTI) Make regular creative contributions to the DFIR team on any one of several levels including cyber threat intelligence reporting, process optimization and documentation, and advances in DFIR tooling and infrastructure.
Full-timeExpandApply NowActive JobUpdated Yesterday
siem cyber security jobs in Detroit, MI
FEATURED BLOG POSTS
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.