- UpvoteDownvoteShare Job
- Suggest Revision
The Enterprise Technology Audit Group - Information Security Audit Team is looking to fill a Senior Audit Manager position to support the coverage of Wells Fargo’s core Information Security and Cybersecurity controls (e.g., Cyber Threat Fusion Center, Data Loss Protection, Security Information and Event Management, Cryptographic Services, Patch and Vulnerability Management, Network Security Management, Access Management, Third Party Information Security Management etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This Senior Information Security Engineer role is an IT generalist position- targeting broad experience and deep expertise in one or more security domains such as Cloud Security, Log Management & SIEM, Continuous Monitoring, Malware Prevention, Firewalls and Intrusion Detection, Vulnerability Management, and Security Awareness.
$110,000 - $130,000Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with integrating application security tools into Enterprise vulnerability management systems (e.g., ServiceNow) Design, document, plan, coordinate, and implement complex information security solutions.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Analyze data from various security tools and systems to identify trends and anomalies. Assist in the development and management of security policies, standards, procedures, and guidelines.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Recommended application security certifications (one or more): OSCP/ OSEP/OSWE, CEH/LPT, CPT/CEPT, CASS, CASE, CMWAPT, CRTOP, GIAC GEVA/GPEN/GWAPT/GCPN/GXPN/GMOB/GDAT. Provide strategic and tactical security guidance for secure application development, including the evaluation and recommendation of technical controls.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Highly experienced with network security concepts related to Threat and Vulnerability Management, system architecture, and Internet technology. Experience with information security programs, audits, controls, risk assessments, and remediation management.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Candidate will also have experience with regulatory compliance from an Information Security perspective, broad knowledge across all information security domains, information security control testing experience, risk/compliance assessment experience, and technical writing skills.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The type of information that will be collected as part of a background check includes, but is not limited to: reference checks, social security verification, education verification, criminal conviction record check, and, if applicable, a credit history check, sex offender registry and motor vehicle records check.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelors or Masters in computer science, system analysis, Information Systems or related field or equivalent work experience. Consult with data stewards, business process owners, subject matter experts, technical experts, end users and other stakeholders to gather information about the current and target state business process, data architecture, domain data models, tools and frameworks used for data capabilities, data sources, control features, data interfaces with other systems required.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security information and event management (SIEM) systems including creating and refining searches for alerting purposes. Partner with Cybersecurity Architect and other Cybersecurity teams to design and implement cloud data security policies, standards, and procedures for Microsoft Azure, Microsoft Information Protection, Microsoft Identity Access Management, and Data Protection.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in one or more cybersecurity domains including, but not limited to: Resilience, Data Security, Identity & Access Management, Cloud, Threat/Vulnerability, Digital Trust, Awareness and Training.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Coordinate with other Front Line Units and Control Functions (FLU/CFs) Data Strategy and Management teams to streamline the Data Sourcing Strategy for Risk Organization. + Evaluate and Recommend tools and frameworks for various data management capabilities (i.e., Metadata, Lineage, Data Quality, Data Protection.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in one of the following areas: Computer Sciences, Computer Engineering, Information Assurance, Information Security and/or Risk Management. At least 6 years of experience applying information security controls methods, processes and risk management best practices in a Global-International forum.
$80,000 - $95,000 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Proven use with zero trust network access, encryption, web application firewalls, data protection, vulnerability management, API security, IaC. Use cloud security tools for asset discovery, cloud workload protection platform (CWPP), control plane configuration and cloud security posture management (CSPM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Customers trust us to provide a portfolio of turn-key systems, products, and services — including two-way radio communications, vehicle uplift, security video and access control systems, BDA/DAS, remote monitoring, GPS tracking, SCADA, dispatch, mass notification, and point-to-point wireless networks.
Full-timeExpandApply NowActive JobUpdated Today
information systems security vulnerability management jobs Title: program manager in Charlotte, NC
FEATURED BLOG POSTS
How to Find a Job That Makes You Happy - 11 Concerning Facts
Do you ever feel like your life is like one of those rom-com movie scene openers? You know, the ones where the main character rolls out of bed, awakened by a casually upbeat theme song, sulks their way to the coffee pot, and then trudges toward their computer to begin yet another boring day at work?
How to Decline a Job Offer You Already Accepted
When you think about it, turning down a job offer is not the worst position you could be in. If you’ve been lucky enough to consider multiple job offers, well, then you’re lucky enough.
How to Practice Fair Chance Hiring for People With Criminal Records
Usually when you think of your dream hire, you think of someone who is respectful, trustworthy, reliable, and has sound judgment, right? As you envision your ideal candidate with these qualities, the last person you think of is someone with a criminal record.
6 Common Mistakes to Avoid When Employer Branding
Currently, job searchers are putting extra effort into researching employers. The information they find plays a major role in whether they will pursue an opportunity with you or look for jobs elsewhere. That is why it is now more important than ever to be proactive and intentional when showcasing your workforce and workplace culture. Having a well crafted employer branding strategy can help you strategize and influence your potential candidates so they see your business in the best light. But in order to do that, you should be aware of some of the most common mistakes that employers make.
What to Say When Terminating an Employee
Terminating an employee is an inevitable part of doing business. Whether you’re re-structuring your department or you’ve identified a few employees who’re not living up to your expectations, letting people go is necessary for keeping your workforce healthy and thriving.
How to Utilize Keywords for Your Job Ads
Before we give you the scoop on how to utilize keywords in job ads, it would be helpful if we defined what keywords are and why they are important. In simple terms,
What Makes a Good Paid Time Off (PTO) Policy
The world of work has undergone some major transformation in recent years. From remote and flexible work to increased emphasis on employee benefits and wellbeing, companies nowadays have to be very intentional about their HR policies and how they approach talent acquisition.