- UpvoteDownvoteShare Job
- Suggest Revision
Recommended application security certifications (one or more): OSCP/ OSEP/OSWE, CEH/LPT, CPT/CEPT, CASS, CASE, CMWAPT, CRTOP, GIAC GEVA/GPEN/GWAPT/GCPN/GXPN/GMOB/GDAT Experience with integrating application security tools into Enterprise vulnerability management systems (e.g., ServiceNow.
$65 - $70 an hourExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Works closely with the Chief Information Security Officer (CISO), IT, and Business Executives, to create and manage the Risk Management Program of Lowe’s. 12 years of experience in combination of risk management, security, compliance and Information Technology.
$179,000 - $340,100 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Partner with Enterprise Risk Management, Information Technology, and Information Security to define standards and provide subject-matter- expertise to oversee enterprise-wide business resiliency risks.
$83,122.92 - $115,407 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience with integrating application security tools into Enterprise vulnerability management systems (e.g., ServiceNow) In this contingent resource assignment, you may: Consult on complex initiatives with broad impact and large-scale planning for Information Security Engineering.
$64.53 - $69.53 an hourFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This Senior Information Security Engineer role is an IT generalist position- targeting broad experience and deep expertise in one or more security domains such as Cloud Security, Log Management & SIEM, Continuous Monitoring, Malware Prevention, Firewalls and Intrusion Detection, Vulnerability Management, and Security Awareness.
$110,000 - $130,000Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Familiarity with Information Governance technology ecosystem and how it supports Information Governance processes including: enterprise content / document management systems, records management systems, archival systems, legal hold management systems, mobile device management systems, communication surveillance applications, privacy compliance management systems, data discovery and scanning, etc.
$124,300 - $227,900 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Softrams is a Maryland and Virginia-based small business information technology, consulting, and solutions provider specializing in emerging technologies for UX/UI, mobile apps, DevOps, big data analytics, data science, and cyber security.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Design, document, plan, coordinate, and implement complex information security solutions. Assist in the development and management of security policies, standards, procedures, and guidelines.
Full-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the development and maintenance of the cyber capabilities including risk calculation, data flow, reporting and integration to support vulnerability management, RedTeam, penetration testing and application security domains in alignment with vulnerability standard.
Full-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role oversees prospect research and identification, portfolio management, database management, advancement reporting, gift recording, data integrity, and data security.
$104,800 - $188,600 a yearFull-timeExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This leadership role requires a strong blend of technical and soft skills, including but not limited to regulatory reporting, liquidity, data management, technology, risk management, negotiation, critical thinking, team building, relationship building, creative problem solving, and more.
Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong knowledge of information security management frameworks, such as International Organization for Standardization (ISO) 2700x, COBIT, National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF), and Center for Internet Security (CIS) Critical Security Controls (CSC.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applied knowledge of technologies for data mapping, risk assessments, third party risk management, compliance tracking, security controls management. Participates in engagements for PCI, data security, compliance and governance frameworks, security vendor assessments and IT controls assessments.
$80,000 - $90,000 a yearFull-timeExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
At least 8 + years of experience in key areas of data management including master data, metadata, data architecture, data governance, data lineage, data quality, data modeling, data standards, data strategy.
Full-timeExpandApply NowActive JobUpdated 4 days ago
information security data management jobs Title: field service specialist in Charlotte, NC
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: