- UpvoteDownvoteShare Job
- Suggest Revision
Information Security Processes: Identity and access management, privileged access management, generic ID management, threat intelligence, vulnerability management, secure coding practices, data security and encryption, phishing, forensics, mobile security, third-party, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Perform independent risk assessments of information risk management related disciplines, including information technology, information security, business continuity management and disaster recovery and records management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Control & Risk Assessment Leader will need to build a network of multi-departmental and multi-level stakeholders inclusive of, but not limited to Information Security, Client and Enterprise Technology, Data Protection, Global and Enterprise Risk Management, Internal Audit, Area and Regional Risk & Data teams, Service Line Quality Leaders, etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Lead the deployment and maintenance of security tools to support cyber threat detection, incident response, and attack surface reduction efforts. Bachelor’s Degree or equivalent experience in Information Security, Computer Science, Electrical Engineering, or related fields.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
8+ years of related experience; ideally a combination of Technology Risk (1st or 2nd line), IT Audit (3rd line) and/or 1st line Information Technology or Information Security experience.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Perform risk management across multiple Information Security (IS) and Information Technology (IT) domains, including but not limited to Cloud Security, Network and End Point Security, Identity and Access Management, Data Protection, Application Security, Cyber Intelligence and Incident response, Threat Hunting, Vulnerability Management, Asset Management, Security and IT operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Office of the Comptroller’s is seeking a Chief Information Security Officer (CISO) who will lead in the implementation and management of information security controls that will increase the Agency’s overall information security posture.
$150,000 - $160,000Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Reports to: Information Security Director. Extensive experience in information security and/or IT risk management with a focus on security, performance, and reliability in a cloud environment.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience & Qualifications 8+ years of related experience; ideally a combination of Technology Risk (1st or 2nd line), IT Audit (3rd line) and/or 1st line Information Technology or Information Security experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Oversee information security programs in the areas of: Security Governance & Risk Management, IT/Infrastructure Security, Threat & Vulnerability Management, and Security Operations.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Specialist, Third Party InfoSec Risk will be part of the InfoSec Architecture team and engage with all team members in Information Security, IT Operations, DevSecOps, Architecture, Information Technology, PPFA strategic business partners, and management staff within PPFA.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Modern Management - Mobility and Security Solutions in any of the following: Microsoft Intune; Autopilot, Desktop Analytics, Conditional Access, identity governance, Azure Active Directory (AAD), Microsoft Cloud App Security (MCAS); Advanced Threat Analytics; Defender for O365, Microsoft Endpoint Configuration Manager.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
2 or more professional certifications (SAFe PM/PO, CISSP, GIAC (various), CISM, CCSP, AWS Cloud Practitioner, AWS Security) Capital One is seeking a product owner to help deliver game-changing cybersecurity solutions based on threat, data, and design thinking.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Purpose: The Associate General Counsel will be principally charged with supporting the PPFA and Action Fund (collectively, National Office) information technology, information security and data-driven initiatives and leading organizational privacy compliance and will provide strategic legal counsel, subject matter expertise and thought partnership in data security and privacy.
Starting at $160,000 - $190,000 a year depends on education, experience (negotiable, confidential)Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Register now to join Memorial Sloan Kettering'sTalent Community ( to receive inside information on our organization and new job opportunities. We are hiring anIT Financial Analyst III - Information Technologyto help manage our digital and technology finances at MSK. Join our team as we carefully and responsibly utilize MSK's resources to build a better, stronger, and more durable MSK.
$88,800 - $142,200Full-timeExpandApply NowActive JobUpdated Today
threat assessment information security jobs in New York, NY
FEATURED BLOG POSTS
Internship Cover Letter Tips with Examples
Until now, college has been about learning, absorbing, and experiencing. It’s not until you become eligible for an internship that things start getting real—real-world experiences using real-life scenarios. Applying for internships takes time, and there’s no college course on “how to apply for jobs.” (We’d sign up immediately if there was, though!) But here's a spoiler alert: most internships require a cover letter. And while this may seem like a burden, it’s actually a blessing.
5 Practical Ways to Remove Bias from your Hiring Process
Many employers think their hiring process is perfect. However, research shows that the hiring processes are generally impartial and unfair, especially if you are part of certain demographics. Women, people of color, people with disabilities, or even people in lower socioeconomic status are more likely to be subject to implicit bias. As diversity and employer branding become major aspects of business, it is important that employers take the lead to identify and remove bias from the hiring process. So, here are 5 practical ways to get you started.
Tips to Get Your First Job Confidently
Whether you’re a recent graduate or you still have a few exams left, you may be itching to put your polished leather shoes on and join the workforce. After all, your first job is an entryway into the professional life you’d lead for the decades to come.
Tips for a Good Character Reference Letter with Examples
Hiring managers love a resume laden with relevant skills and qualifications. Hard skills specific to the role, like SEO strategy or Java programming languages, are easy to qualify using achievements or facts and figures. But how exactly can they verify personality traits, work ethic, relationship management skills, or curious nature during an interview when they barely know you?
How to Dress on the First Day of Work (Men & Women)
You did it! Out of hundreds of applicants and dozens of people interviewed, you’re the one who got a new job. Congrats! Now comes the question of how to dress on the first day of work.
Why College Students Should Work While in College?
College is a special part of our lives. It’s a time when we prepare for our dream job while creating some of the most memorable moments in life. That said, college life can also be stressful. Not only do we have to spend long hours studying, writing and researching, but we also have to deal with increased tuition fees and living expenses.
5 Ways to Measure Candidate Experience
Your candidate experience is made up of 4 essential parts