- UpvoteDownvoteShare Job
- Suggest Revision
As a direct report to the Chief Information Security Officer (CISO), the VP of Segment and Product Security is responsible for defining the strategy for product and data security, supporting all Humana business segments.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ISO and the information security team advise and instruct other functional teams on infosec concerns related to areas such as change control (change management), software design, network architecture, and other areas where technical controls related to information security are implemented.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge of regulatory compliance requirements (CIS, NIS, PCI, etc) and IT management frameworks (ITIL, etc)Working knowledge of a Information Security practices, standards, and systems (DLP, GRC, IAM, SIEM, VPN, etc)Experience with launching and managing contractors, short term and long term services to provide support or project based work.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The overall team consists of 25 security professionals that report to the Chief Information Security Officer. Assist Information System Security Officer (ISSO) in assessing program security effectiveness of hardware and network systems.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidates will have senior-level experience in Security Information and Event Management (SIEM) and senior-level experience as an Information System Security Manager (ISSM.
RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Roles and Responsibilities: The Senior GIS Systems Engineer is responsible for the design, build, automation, support, security, management, and optimization of GIS systems, such as such as ESRI ArcGIS Software Suites, ESRI Portal for ArcGIS, and supporting software.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Help with clients’ internal conversations about business processes dependent on information technologies, information security, budgeting for improvements, and cyber insurance procurement.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and implement security policies, procedures, and controls while helping to build a solid information security management system. Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
IT Operations Management: Overall IT Operations Management, Service Level Management, Resource Management, Processes & Standards Implementation, Compliance Management, Incident Management, Financial Management, Technical Management, Information Security Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Company Overview: At CACI, you will have the opportunity to make an immediate impact by providing information solutions and services in support of national security missions and government transformation for Intelligence, Defense, and Federal Civilian customers.
ExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Information and Event Management (SIEM) tools like Datadog. Cloud Security Posture Management (CSPM) tools like Prisma Cloud. Develop and implement a strategic security program to protect the organization's information assets.
Full-timeExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Information risk, privacy, and strategy (i.e. security and privacy policies, or risk assessments, or security and privacy compliance); The Identity and Access Management Security Specialist has the primary responsibility for the management and day-to-day operation of Fortune 500 Customer’s Identity Management systems and tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform the design, planning, QA/QC, implementation, assessment, and management of access control systems, digital video surveillance systems, CCTV (Closed-circuit television), building security, building automation, and physical intrusion detection systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Join Cloudflare's Bot and Fraud Detection team to tackle real-world security challenges, leveraging massive threat intelligence data through data science and machine learning. Athenian Project : We created Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration.
$137,000 - $198,000 a yearFull-timeExpandApply NowActive JobUpdated 9 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Provide for Incident Response and Problem Management including root cause of system problems, such as configuration issues resulting in operational performance degradation or system outages, supporting the local manager with information and advice on the necessary corrective actions and/or interim workarounds.
ExpandApply NowActive JobUpdated Today
security management information jobs in Kansas City, MO
FEATURED BLOG POSTS
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.
Making Hybrid Work More Efficient
Covid was a catalyst for change in the work environment. Keeping people safe and helathy was the initial goal for employers, but the unintended result was the considerable demand in remote work. Now, onsite work has been dramatically altered to remote work, which is now transforming into a combination of the two: hybrid work.
How Can HR Technology Help Retain Employees?
Human resources' rapid adoption of technology has led to new ways of streamlining human capital management. Based on the IEE Global Study, these technologies changed how HR handled recruitment and retention in 2022. This includes tech like
Why is Time Management Important? 10 Crucial Importances of Time Management
We’ve all been there before. What starts as a relaxing evening scroll quickly becomes a full-blown binge. You blink, and it’s midnight - throwing off your entire next day before it even starts. And at its worst, this indulgence might leave you feeling behind on things you planned to finish that night. This is why time management is important.
Minimizing Candidate Renegs During the Hiring and Onboarding Process
Candidates reneging on job offers or during the onboarding process can be a frustrating experience for any recruiter. In a talent-driven job market, it’s common for candidates to have more than one job offer to consider. It becomes a race against time to see which organization can offer the best career experience, compensation, and circumstances that secure the right employees.