- UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of general cybersecurity concepts and methods including, but not limited to secure configuration management, data protection and privacy, security monitoring, incident response, governance, risk and compliance, patch management, enterprise security strategies and architecture.
$190,300 a yearFull-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in vulnerability management and risk assessment with the ability to come up with creative solutions to maintain CIA and keep business functioning. This is a hands-on role; familiarity with Enterprise Security Architectures, Windows systems, Networking, and OT/BMS is critical.
Full-timeExpandApply NowActive JobUpdated 16 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This includes overseeing IT strategy and planning, network and infrastructure management, enterprise systems and applications, data privacy and security, IT operations and support, IT project management office, vendor management, and compliance and risk management.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Understand the IT processes of Incident Management, Problem Management, Change Management, and Configuration Management. The incumbent is responsible for managing the Engineered Systems portfolio consisting of Exadata, Exalogic, Exalytics, ZFS appliances, and Cloud@Customer enterprise infrastructure platforms.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrate experience of ITIL processes like Incident management, Problem Management, Knowledge management, Release management, Data DevOps etc. Lead the design and delivery of Data processing activities like Data Ingestion, Data processing (ETL and ELT), Data cleansing, profiling, and wrangling, Data Governance (Data Quality, Lineage and Data security), Master Data management, BI reporting, and Analytics.
$198,000 a yearFull-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As a Data Center Tech, you will work primarily in an Enterprise sized Data Center of 20k square feet in Brecksville, OH, and several smaller rooms in other facilities in Northern Ohio. This individual should be a skilled, hands-on professional with the ability to install and remove equipment using sound methods and procedures, with experience in providing redundant connections using data center structured cabling.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role is the top-level security technical expert for incident response, vulnerability management, analysis, threat hunting, event management, and recovery. Lead incident response, investigations, and security breach management with legal support.
ExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with security principles relating to, IAM, DLP, SDLC, IT asset management, secure architecture and Incident Response. As a key member of the enterprise risk management team, the Senior IT Security Engineer leads secure platform engineering efforts, focused on the secure development, and operations of our banking and cloud-based environments.
RemoteExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Incident Response and Management: Skills in handling security incidents, forensic analysis, and implementing effective recovery strategies. The CISO applies industry security standards, best infrastructure and application security practices, and threat assessment frameworks to build and communicate enterprise information security strategies.
Full-timeExpandUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience in independently leading security operations, including incident response, threat intelligence, vulnerability management, and security monitoring. Security Operations Management: Lead the security operations team for product and infrastructure, ensuring the implementation of robust security controls, incident response protocols, vulnerability management, and security monitoring.
ExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Additional responsibilities include critical space management, project coordination, asset management/inventory control and strict alignment to change and incident management policies.
Full-timeExpandUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position involves advanced troubleshooting, performance optimization, incident management, and the implementation of strategic network solutions. The Level 3 Enterprise Network Operations Center (NOC) F5 Engineer is a senior technical role responsible for managing and maintaining the complex enterprise network infrastructure.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Manage, operate, and monitor network firewalls, web security, email security, virtual private network, security information and event management system and logging systems, public key infrastructure, Multi-Factor Authentication, vulnerability management, Endpoint Detection and Response, web application firewall, and Single Sign-On technologies.
Full-timeExpandUpdated 10 days ago
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.