- UpvoteDownvoteShare Job
- Suggest Revision
Consult with data stewards, business process owners, subject matter experts, technical experts, end users and other stakeholders to gather information about the current and target state business process, data architecture, domain data models, tools and frameworks used for data capabilities, data sources, control features, data interfaces with other systems required.
ExpandApply NowActive JobUpdated 13 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Relevant information security certifications (e.g., CISSP, CISM, CEH, PCI ISA, CRISC, CISA, OSCP, GPen) Works closely with the Chief Information Security Officer (CISO), IT, and Business Executives, to create and manage the Risk Management Program of Lowe’s.
$179,000 - $340,100 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design, document, plan, coordinate, and implement complex information security solutions. Recommended application security certifications (one or more): OSCP/ OSEP/OSWE, CEH/LPT, CPT/CEPT, CASS, CASE, CMWAPT, CRTOP, GIAC GEVA/GPEN/GWAPT/GCPN/GXPN/GMOB/GDAT.
$80 - $85 a yearExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: Charlotte NC Jobs, Information Technology Director, IT Customer Support, IT Business Change Management, User Administration, Systems Administration, Network Administration, IT Management, POS Systems, Project Management, Network, Networking, IT Support, Restaurant Industry, North Carolina Recruiters, IT Jobs, North Carolina RecruitingLooking to hire for similar positions in Charlotte, NC or in other cities.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Ethical Hacker (CEH.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Risk Mitigation - Perform primary oversight and monitoring of Gap Assessment efforts (Risk Management, Liquidity, Capital, Information Security and CECL). Knowledge of major regulatory areas of focuses including Consumer Compliance Regulations, FFIEC Guidance, Stress Testing, Model Risk Management, Capital Planning and Forecasting, Enterprise Risk Management, and Operational Risk Management, Data Governance, etc.
$240,000Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Provide strategic and tactical security guidance for secure application development, including the evaluation and recommendation of technical controls. Experience with integrating application security tools into Enterprise vulnerability management systems (e.g., ServiceNow.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oversee the development of red teaming methods and solutions within and across the enterprise, to include (but not limited to) the areas of business continuity, emergency management, supply chain security, information security, personnel security, operations security, and facilities security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) - CTRs serve as experts in intercepting signals.
Part-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with information security programs, audits, controls, risk assessments, and remediation management. Experience conducting information security risk assessments of vendors and vendor software.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Degree: Bachelor’s or Master’s degree in a relevant discipline (e.g., Computer Science, Data Science, Decision Science, Engineering, Information Systems, Information Technology, Internet of Things, Applied Math, Machine Learning, Quantum, or other technology majors.
$65,000 - $87,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
CITI Research Trainings (Good Clinical Practice, Social & Behavioral Research/IRB, Biomedical Research/IRB, Health Information Privacy & Security); Minors on Campus Training; First Aid, CPR, & AED Training.
$56,795 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Design and develop security policies, standards and procedures across various domains (e.g., Resilience, Data Security, IT Asset Management Governance, Digital Trust, IAM, Cloud Security, Application Security, etc.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
By applying, you consent to your information being transmitted by Jobcase to the Employer, as data controller, through the Employer’s data processor SonicJobs. Licensure and Certification Required:Current registration with North Carolina State Board of Nursing as a registered professional nurse BLS Certification Duke is an Affirmative Action/Equal Opportunity Employer committed to providing employment opportunity without regard to an individual's age, color, disability, gender, gender expression, gender identity, genetic information, national origin, race, religion, sex, sexual orientation, or veteran status.
ExpandApply NowActive JobUpdated Today
information security data jobs Title: domain architect in Charlotte, NC
FEATURED BLOG POSTS
How to Write a Statement of Interest the Best Way
Your life's goal is to work for Company A. Their brand, their product, their reputation—it's safe to say you're a fan. The only problem is that their careers page never highlights the role that matches your skills and experience. It's a bummer for sure, but don't fret.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.
How to Decide Between Two Job Offers: 10 Practical Tips
It’s arguably a good predicament to have. You’ve applied to many jobs, interviewed multiple times, and now find yourself with two legit job offers. Nice! But although this is a feel-good validation of everything you have to offer, a daunting choice lies ahead. How do you decide which job will be the best fit for you?
Why Work in Sales? 9 Reasons & Tips on Answering as an Interview Question!
Working in sales can be demanding and challenging, but it can also be gratifying. Sales is an excellent career with a clear path full of excitement and potential for growth. So, if you're contemplating careers and have wondered "why work in sales?", keep reading to determine if sales is a suitable role for you.
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?