- UpvoteDownvoteShare Job
- Suggest Revision
In this role, you will collaborate closely with business and IT executives across our brands to assess security risks and play a significant leadership role in developing, enabling, and advancing Information Security Governance, Risk & Compliance (GRC) processes and capabilities across PVH brands and business units.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Rutgers, The State University of New Jersey, is seeking a Information Security Analyst for the Office of Information Technology (OIT). The Office of Information Technology (OIT) is Rutgers' enterprise IT office.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Cryptologic Technician Interpretive (CTI) – CTIs serve as experts in linguistics (including Arabic, Chinese, Korean, Persian-Farsi, Russian and Spanish) and deciphering information in other languages.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
2210 Information Technology Specialist. 1084 Visual Information Specialist. For more information on the types of veterans preference for which you may qualify, visit the Feds Hire Vets Veterans Preference web page.
Full-timeExpandApply NowActive JobUpdated 28 days ago - UpvoteDownvoteShare Job
- Suggest Revision
It's an exciting time to be part of the IFF Global IT Team. The VP, Chief Information Security Officer will lead the security organization from end to end. Establish and maintain a culture of constant vigilance, information risk management, and industry awareness of information risk and protection of IFF's information assets and critical business systems and processes.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Technology (IT) Cloud Engineer IV is responsible for leading the creation of a cloud platform technology framework and providing technical architecture and design leadership in support of IT initiatives in cloud computing and automation across the Hackensack Meridian Health (HMH) network.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
MS/MA in Business Administration/Management, Accounting, Finance, Math Economics, Computer Science or Management Information Systems (MIS) and 1 year of experience or BS/BA in Business Administration/Management, Accounting, Finance, Math, Economics, Computer Science or Management Information Systems (MIS) and 6 years of experience.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will report to the Manager of IT Quality Assurance in the Information Technology department. Since 1989, SHI International Corp. has helped organizations change the world through technology.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Technical knowledge in some of the following domains in a cloud or on-premise context: routing/switching, stateful or next gen firewalls (NGFW), distributed denial of service (DDoS) mitigation, web application firewalls, intrusion detection / prevention systems (IDS/IPS), network segregation, security information and event management (SIEM), Container and Orchestration technologies, Infrastructure as Code, and other threat and vulnerability management capabilities.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of five (5) years of experience performing Information Security assessments with knowledge of HIPAA, GLBA and PCI DSS regulations and frameworks such as NIST CSF. Job Title: Information Security Risk Analyst (x2.
ExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Develop and maintain security standards, procedures and guidelines to ensure compliance with the health information technology requirements of HIPAA. Bachelor’s degree or equivalent; degree in Information Technology, Business, or related field.
$250ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Creates, updates, and maintains written communication about requirements, deadlines, events, and other information related to doctoral students and faculty, including PhD and DrPH student handbooks, Canvas pages, student forms and other student-focused information and materials.
$64,244 - $91,311Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
TITLE- Information Security Risk Analyst. Information Security Risk Analyst. Ability to effectively analyze, document and communicate information security concepts to different user bases, including students, faculty, staff and systems personnel.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Job DescriptionJob DescriptionDescription:Support in identifying cybersecurity deficiencies in information systems by performing technical assessments of assigned systems and applications to determine the severity of weaknesses; Supports the Security Authorization (SA) and Continuous Monitoring (CM), Risk Management Framework (RMF) process.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Utilize the hospital and Radiation Oncology EMR systems to record patient treatment delivery, document patient positioning information, and communicate any pertinent information regarding the patient’s care coordination.
ExpandApply NowActive JobUpdated 4 days ago
information job Title: technology lead Company: Department Of The Treasury in Sayreville, NJ
FEATURED BLOG POSTS
Why Cover Letters Are Important & How To Write One | Job\Searcher
Most people completely waste their cover letter real estate. Your cover letter is another opportunity to speak directly about how your background and capabilities align with the opportunity you seek. It also allows you to introduce your personality a bit more than a resume does. So, why are cover letters important? Because you can stand out, big time, with a custom cover letter directed to the right person.
Hiring Again After Mass Layoffs
It's never an easy decision to let members of your staff go, but depending on the state of your business, mass layoffs may have been the only way to survive. Now that you're months into the future, you may find yourself itching to start hiring again after previous layoffs.
Why Are Internships Important & How Can You Get One?
Internships are for college students or people who have just completed their degree. If you are a student or recent grad, you may be wondering how to land an internship. If you've never had one, you may even wonder if you need one. After all, didn’t you work in that call center while also doing exams? Or perhaps you’ve bartended your first year in college?
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.