- UpvoteDownvoteShare Job
- Suggest Revision
Experience with integrating application security tools into Enterprise vulnerability management systems (e.g., ServiceNow) Design, document, plan, coordinate, and implement complex information security solutions.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Assist in the development and management of security policies, standards, procedures, and guidelines. Recommended application security certifications (one or more): OSCP/ OSEP/OSWE, CEH/LPT, CPT/CEPT, CASS, CASE, CMWAPT, CRTOP, GIAC GEVA/GPEN/GWAPT/GCPN/GXPN/GMOB/GDAT.
$80 - $85 a yearExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong functional and technical knowledge of information/cyber security capabilities with deep expertise in one or more of the following areas: Encryption, Data Security, Application Security, End Point Security, Identity and Access Management, Windows/Unix/Linux Systems Security, Mainframe Security, Perimeter Security, Network Security, Mobility Security, Cloud Security, Cyber Security, Cryptography, or Authentication Systems.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The primary purpose of this role is to support the design, implementation, and ongoing operations of information security tools and services in the Identity and Access Management (IAM) space, specifically around authentication and authorization.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Softrams is a Maryland and Virginia-based small business information technology, consulting, and solutions provider specializing in emerging technologies for UX/UI, mobile apps, DevOps, big data analytics, data science, and cyber security.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2-5 years of experience in any combination of Third-Party Risk Management, Data Governance, Data Privacy, Operational Risk Management and/or Information Security Risk Management.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This Senior Information Security Engineer role is an IT generalist position- targeting broad experience and deep expertise in one or more security domains such as Cloud Security, Log Management & SIEM, Continuous Monitoring, Malware Prevention, Firewalls and Intrusion Detection, Vulnerability Management, and Security Awareness.
$110,000 - $130,000Full-timeRemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong experience in case management, data modelling, system integration, agents, user experience design, security, background processing, performance, deployment, and unit testing.
$63 - $66 an hourExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
By applying, you consent to your information being transmitted by Jobcase to the Employer, as data controller, through the Employers data processor SonicJobs. Additional information and provision for requests for reasonable accommodation will be provided by each hiring department.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with AWS, Microsoft Azure or Google Cloud Platform configuration and administration of security features and services (including identity and access management, networking, firewalls, encryption.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize subject matter knowledge in industry leading security solutions and best practices to implement one or more components of information security such as availability, integrity, confidentiality, risk management, threat identification, modeling, monitoring, incident response, access management, and business continuity.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Opportunities to advance into data engineering management or data science roles. Implement best practices for data governance, security, and compliance to ensure the integrity and confidentiality of our data assets.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our service offerings have grown in the past ten years, including infrastructure resiliency, contact center operations, information technology, software engineering, program management, strategic communications, engineering, and cybersecurity.
$105,600 - $132,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Strong background in logical security, change management, computer operations auditing techniques and/or computer control environments. synthesize data and convey information in a meaningful way.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Qualified to pursue a job-relevant certification including Certified Public Accountant (CPA), Certified Information Systems Auditor® (CISA®), Certified Information Systems Security Professionals® (CISSP®); Certified Information Security Manager® (CISM®) and/or Certified Information Privacy Professional (CIPP.
Full-timeExpandApply NowActive JobUpdated Today
information security data management jobs Company: Cpi Security in Charlotte, NC
FEATURED BLOG POSTS
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.
How to Get Into The Trades: Step-by-Step Guide
Getting a trade job can be a great career move if you like variety and prefer to learn on the job instead of in an academic setting. A trade job can offer security and be a lucrative career path as the demand for skilled trade workers continues to grow.
How do Good Interviewers Prepare for Interviews?
Just like candidates take the time to research you and your company, you should take the time to prepare for the interview. Preparing for the interview doesn't just reflect well on your employer brand and create a better candidate experience. Preparation also helps prevent bad hiring decisions. Bad hiring decisions are usually a result of poor execution during the hiring process. However, going into an interview fully prepared and ready to evaluate candidates will help avoid bad hires. So, here are 6 interview preparation tips for employers.
Should I Hire for Potential Over Experience?
The workforce is shifting every day. In fact, research from the World Economic Forum (WEF) shows over half of employees around the world will need to upskill or reskill by 2025. The rapid rise of digital literacy, automation, and new technologies will quickly supersede businesses that don't train ahead of the curve. With the dire need to invest in training, it's evident that hiring someone with experience isn't that much different than hiring someone without it.