- UpvoteDownvoteShare Job
- Suggest Revision
Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management, Network Security/Secure Transmission Management, Data Loss Prevention, Identity Access Management, Threat Intelligence, Penetration testing, IT Risk Management.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Build, configure and maintain the Cloud identity security, IAM, SSO and PAM solutions (Ping Federate/Ping ID/Ping SSO, Sailpoint IdentityIQ, CyberArk, Microsoft Active Directory (AD), Microsoft Azure/Azure AD/Azure AD Connect, Amazon Web Services (AWS), Google, Directory Services Administration Tools and Service Interfaces.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
IOT / ICS / OT Security solutions, DevSecOps, XDR. Maturity assessments, 3 rd party risk assessments, IOT/ICS/OT security assessments, PCI/HIPAA assessments. Firewall, Email and Web security, EDR and EPP solutions, NAC, MDM.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job SummaryThe Senior Vice President (SVP), Chief Information Security Officer (CISO), will enable the business to operate securely and within regulatory requirements by controlling information security governance and compliance, developing guidelines and policies, managing information security risks, and overseeing the Information Security Management organization.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Some examples of the equipment and systems include but are not limited to the following: Operation of Power Industrial Equipment such as forklifts, Cranes, AGV’s, barcode scanners to manage inventory in the WMS (Cambar), BlueJay TMS (Transportation Management System), SAP, Security gates, cameras, ticket applicators, pallet invertors, and any other systems or equipment needed to meet the demands of the business.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Senior Vice President (SVP), Chief Information Security Officer (CISO), will enable the business to operate securely and within regulatory requirements by controlling information security governance and compliance, developing guidelines and policies, managing information security risks, and overseeing the Information Security Management organization.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive experience supporting security frameworks & controls for HIPPA, PCI, SOX, CIS, NIST, ISO, etc. The Senior Principal Network Security Engineer contributes to the strategic technical direction of network security infrastructure and services.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Application Security, AWS Security, Container Security. Proactively research and monitor security-related information sources to aid in vulnerability discovery. Application security in large production environments.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security (GuardDuty, CloudTrail, Secrets Manager, EKS/ECR, IAM family, Config), Vulnerability management (Qualys/Nessus, Twistlock, Snyk), SIEM (SumoLogic or Splunk), Container Security, CI/CD Discipline (Helm, Terraform, Chef, Kubernetes (EKS.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Work Authorization/Security Clearance This position requires a valid state-issued license to work in the cannabis industry (e.g., MED Badge). Work Authorization/Security Clearance This position requires a valid state-issued license to work in the cannabis industry (e.g., MED Badge.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Splunk Phantom Certified Admin and/or Palo Alto Networks Certified Security Automation Engineer a. Experience with other Information Security solutions including DLP, NAC, SASE, NGFW, EDR, XDR, SIEM.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, Security+, CySA+, CISM, CRISC or CCNA Security. Experience with Palo Alto XDR, Palo Alto Prisma, Logrythm, KnowBe4 and O365 E5 Security desirable. Create policy, configure, support, and monitor security tools such as endpoint protection, Security Information and Event Management(SIEM),Intrusion Detection Systems(IDS)to safeguard assets against malicious activity.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Security Integration: Collaborate with cybersecurity teams to integrate IAM solutions with other security controls such as security information and event management (SIEM), privileged access management (PAM), and data loss prevention (DLP) systems.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job Summary We are currently seeking a Mechanical Engineer II.
ExpandApply NowActive JobUpdated 6 days ago
door security jobs in Columbus, OH
FEATURED BLOG POSTS
How to Calculate Net Income
Understanding your finances can be daunting even if you’re good with numbers. Your net income, in particular, is a key metric for determining how well you’re doing financially and whether your current way of operating is sustainable or not.
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra:
6 Best Ways to End a Cover Letter with Examples
Including a cover letter with your resume is a great way to introduce yourself to the hiring manager, tell them why you’re the ideal fit for the role, and provide context about your personal situation. A strong cover letter will give you an advantage over other applicants. But it’s important that you structure it properly and write it powerfully so that it carries an impact. This article will discuss how to end a cover letter effectively so you catch the eye of a hiring manager and increase your odds of landing an interview. Read on to learn more.
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
16 Tech Jobs You can Get Without a College Degree
You might think that if you don’t have a computer science, information technology, or related degree, then there’s absolutely no way you can break into the technology field and score a high-paying tech job. But this is a misconception. There are actually tons of tech jobs out there that don’t require a college degree. Instead, employers are more interested in the skills that you can offer. So, read on to learn more about how to land tech jobs without a degree.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.