- UpvoteDownvoteShare Job
- Suggest Revision
You'll also manage, maintain, and monitor TTEC security solutions and processes to provide Tier 1 Support and Security Incident Management. You'll use various tools and dashboards to monitor the TTEC environment, triage the events to detect legitimate security concerns and respond according to established playbooks.
$60,000 - $75,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
DUTIES: Provide technical leadership in designing, developing, and automating the standard operations procedure for security incident responses; identify software vulnerabilities using software security concepts including vulnerability management, penetration testing, threat models, security reviews, and secure design frameworks; write Python scripts for process and data automation for vulnerability management and reporting; review application architecture created in.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
We are not looking for a CISO. In this growth infused role, you will work between our internal security engineering, incident response and external suppliers to identify, adopt and integrate security monitoring and alerting content into our security management framework.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
6-8 years of experience in Incident Management, Change Management and Problem Management. Monitor process and software changes that impact production support, communicate project information to the production support staff and raise production support issues to the project team.
ExpandApply NowActive JobUpdated 20 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Problem management will as part of RCA will review the maturity level of the incident owner. Role entails implementing dashboards to monitor and share Observability at various levels (engineering teams, portfolio, senior management.
ExpandUpdated 0 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of the following tools and technologies: Oracle, SQL Server, Toad,. Net, MQ, and Windows operating systems. 6-8 Years of experience in Windows Based Operating Systems, including IIS knowledge and SQL Server.
Full-timeExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Represent the Production Support organization on company-wide project teams. Perform production support activities which involve assignment of issues and issue analysis and resolution within the specified SLAs.
Full-timeExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintain and monitor the enterprise information security and IT risk management program to ensure the confidentiality, integrity, and availability of information owned, controlled, or processed by the organization.
ExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead efforts in incident management, risk assessment, and business continuity planning, ensuring seamless operations. Develop and implement reporting processes to monitor vendor performance, staffing requirements, and budget oversight, ensuring alignment with business priorities.
RemoteExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Works jointly with Risk Management Director and Incident Management Manager to establish and monitor the organization's approach to investigating allegations of abuse, neglect, exploitation of persons served, and/or other types of events, to ensure the health, safety, and welfare of persons served by Bancroft.
Full-timeExpandUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
REQUIREMENTS: Bachelor’s degree, or foreign equivalent, in Computer Science, Engineering, or related technical field, and five (5) years of experience identifying software vulnerabilities using software security concepts including vulnerability management, penetration testing, threat models, security reviews, and secure design frameworks; of which three (3) years include writing Python scripts; reviewing application architecture created in.
ExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to provide technical advice, guidance, and recommendations to management and other technical specialists on critical information technology security issues. Looking for an opportunity to detect legitimate security concerns and monitor for potential security concerns.
RemoteExpandUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Job SummaryJob DescriptionDUTIES: Provide technical leadership in designing, developing, and automating the standard operations procedure for security incident responses; identify software vulnerabilities using software security concepts including vulnerability management, penetration testing, threat models, security reviews, and secure design frameworks; write Python scripts for process and data automation for vulnerability management and reporting; review application architecture created in.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Prepare for, coordinate, and support, as required, the DCS G-6 and/or the Director, NC4SI at various forums, including, but not limited to, the Strategic Engineering & Architecture, the Incident Management Team, the Countering Weapons of Mass Destruction Working Group, and the Defense CBRN Response Enterprise Council of Colonels and General Officer Steering Committee.
ExpandUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience in Incident, Change, and Problem Management. Monitor process and software changes affecting production support. Our client is seeking an Application Production Support Analyst.
ExpandUpdated 8 days ago
incident management monitor jobs in Philadelphia, PA
FEATURED BLOG POSTS
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Avoid a Bad Hire
"A new employee who doesn't meet the minimum performance, quality, and culture fit standards you set when you began sourcing and recruiting. Additionally, bad hires will immediately show signs of self-interest instead of an interest in their role and the company."
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.
In-House vs Outsourcing Recruiting: Which is Better?
When looking at in-house vs outsourcing recruiting, it is important to nail down the benefits for each and whether those benefits outweigh the risks that follow.