- UpvoteDownvoteShare Job
- Suggest Revision
Advising clients on how to integrate the Six Security Domains: Infrastructure Security, Data & Application Security, Intelligence & Analytics, Threat & Vulnerability Management, Identity and Access Management, and Program Strategy & Operations - throughout their application and data center infrastructures, as well as into their business processes.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Incorporate core data management competencies including data governance, data security and data quality. ,SnowflakeSQL (medium to complex queries)ETL tools, primarily Talend or similar (Ab Initio, Informatica)Source Code Management tools and best practices (similar to: Git, Git Actions, branch management)Working knowledge of:CI/CD Pipelines (similar to: Jenkins, UCD)Process Orchestration Tools (similar to: AutoSys, Airflow, Step Functions )Infrastructure as Code (similar to: Terraform, CloudFormation)What is a Must Have.
$121,000 - $199,600Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Palo Alto Networks with NextGen features including: App-ID, User-ID, Content-ID, DeviceID, URL Filtering, Threat Prevention, Wildfire, Zones, Security Policies, Security Profiles, Inbound/Outbound SSL Decryption, File Blocking, or Data Filtering/DLP, DAG/DUG, EDLs, NAT/PAT, Virtual Wire, Virtual System (Vsys), Panorama centralized management, Prisma Cloud and Global Protect.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Paladin has offices coast to coast across the United Stated and Canada, and nearly 1,600 talented and committed professionals dedicated to custom-crafting and installing technology solutions for clients requiring Integrated Security, Network Infrastructure, Audio Visual, Fiber Optics/OSP, Structured Cabling, and more.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Implementation support of new software and applications solutions, including but not limited to: Timekeeping/Labor tracking, USG Property, Governance Risk Compliance (GRC), Subject Invention Reporting, customer relationship management (CRM), Contract lifecycle management (CLM), analytics and reporting platforms, and more.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Synopsys is seeking a Senior Information Security Engineer, to join our team and is responsible for the Identity Access Management and Data classification programs. Extensive knowledge and experience with identity and access management technology, such as single sign-on (SSO), two-factor authentication, privileged access management, Federation etcDirect, hands-on experience or strong working knowledge of managing security in IT /connected devices, infrastructure applications, security operations.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Apigee Technical Architect will play a vital role in the architecture design, testing and deployment of Apigee API management solution. Experienced in Apigee API development and setting up the API Security/custom/analytics/transaction needs of API for Human/Desktop/Mobile consumption.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security (GuardDuty, CloudTrail, Secrets Manager, EKS/ECR, IAM family, Config), Vulnerability management (Qualys/Nessus, Twistlock, Snyk), SIEM (SumoLogic or Splunk), Container Security, CI/CD Discipline (Helm, Terraform, Chef, Kubernetes (EKS.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Python, GitHub, Rally, AWS, Cognos/MicroStrategy, PowerShell, ETL tools (SQL Server Integration Studio (SSIS), Glue or Talend), familiarity with Kanban/Agile practices, test driven development, experience with cloud technologies preferred.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Under the Fair Chance Act, agencies are not allowed to request information about an applicant's criminal history until a conditional offer of employment has been made, except as allowed for access to classified information; assignment to national security duties or positions; acceptance or retention in the armed forces; or recruitment of a Federal law enforcement officer.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Advance the Company's cyber threat and vulnerability management program to ensure consistent identification, analysis, response, and monitoring of cyber security threats, events, and vulnerabilities.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This means that Ramsey County will provide the Social Security Administration (SSA) and, if necessary, the Department of Homeland Security (DHS), with information from each new employee's Form I-9 to confirm work authorization.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
For this role, the candidate should have experience with some of the following tools/platforms: SQL, Databricks, Python, Snowflake, Sagemaker. In addition, our Life Balance program provides access to professional counseling services, life coaching and other resources to support your daily life needs.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversees the design and implementation of all Security programs, including uniformed security officers, investigations, threat management, intelligence, training, case management, and education/awareness programs.
ExpandApply NowActive JobUpdated 11 days ago
security management jobs in St Paul, MN
FEATURED BLOG POSTS
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.