- UpvoteDownvoteShare Job
- Suggest Revision
Interface with other teams in Information Security (e.g. network operations, Cyber Threat Operations Center (CTOC), vulnerability management) along with information and liability risk officers and technology management to help guide cyber security investigations and incidents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Associates within TRM are highly-skilled information security, cybersecurity, site reliability engineering, technology, and risk management professionals. At least 5 years of experience working in information security, information technology or risk management.
$233,100 a yearExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This position manages the auditing of IT general computer controls (GCC) regarding: networks, operating systems, databases, computer operations, data security administration, and data center physical security to evaluate their effectiveness, identify risks, and recommend corrective action.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of security technology platform CrowdStrike Falcon Suite. Minimum 1 years of experience providing information security support for a Public Sector Local or State government environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Engineer II will work with stakeholders and team members to assist with improving incident response processes that are aligned with the mission of the office of the CISO.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In-depth experience of vulnerabilities, intrusion detection systems, firewall management, network vulnerability analysis, cryptographic theory and practice, incident analysis and response, software testing and security assessment, malicious code and software exploitation techniques, continuous monitoring and event logging, cyber-crimes, computer forensics analysis and computer crime investigation.
$200ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with multiple information technology and security technologies: IIS, SQL, firewall, IPS/IDS, Windows, Linux, Anti-Virus, mail filtering, WAF, encryption, CA authority, IDM/IAM, multi factor authentication, SSO, VPN, Zero Trust Technologies, Vulnerability Management, DDoS, SIEM, FIM, WIPS, MDM, Pen Testing, VMware and VM server platforms.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Georgia Tech's faculty attracted more than $1.4 billion in research awards this past year in fields ranging from biomedical technology to artificial intelligence, energy, sustainability, semiconductors, neuroscience, and national security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in Computer Engineering, IT, Computer Science, or a related field. Our Enterprise customers are comprised of Fortune 500 companies, such as Hyundai, Bosch, Kraft-Heinz, John Deere, PepsiCo, and others.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our senior consultants provide support in Cybersecurity, Cloud Security, Application Security, DevSecOps, Network Security, Data Security, Threat and Vulnerability management, Identity and Access Management, Encryption, PKI / CLM Architecture, Technology Risk Management, GRC Solutions, IT Audit, IT Compliance, IT Controls Integration, IT Compliance, Report and Certification preparation and remediation, and Advisory services on program design, build, review, and modernization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Maintain knowledge of current security technology and systems; leverage knowledge to protect people, property, and information efficiently and effectively. Experience recommending and implementing security technology resources.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Contact Information Requests for information may be directed to Rex Welch, HR Director at rex.welch@osp.gatech.edu The candidate of choice will be required to pass a pre-employment background screening.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's Degree in Computer Science, Cybersecurity, Information Technology, or related discipline or equivalent work experience. Typically a minimum of five years of information security experience (red teaming, purple teaming, penetration testing, cloud security, and/or network security.
$150RemoteExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Preference given to a degree or certification in security management, electronics, technology, or equivalent. Bachelor's of Science in Engineering Technology or related degree from an accredited program.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor's degree in Business, Accounting, Computer Science, Information Systems and Decision Sciences, Internal Audit or a related field is required. EisnerAmper is seeking a Senior Manager to lead IT risk advisory related engagements such as conducting risk assessments, examining technology systems, analyzing the effectiveness of IT controls, and developing recommendations for improving security design.
Full-timeExpandApply NowActive JobUpdated Yesterday
information technology computer science security jobs Company: Rpc Inc in Atlanta, Holdrege, Nebraska
FEATURED BLOG POSTS
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.