- UpvoteDownvoteShare Job
- Suggest Revision
Kyruunauts in the Senior Director, Information Security role can move in a more linear career path to a VP, Information Security. Information Security Compliance and Certification Leadership: Collaborate with other compliance-focused leadership roles on the team to ensure a cohesive approach to compliance with regulatory requirements and industry standards and participate in achieving and maintaining compliance with critical healthcare regulatory frameworks, such as SOC2, HIPAA, HITRUST, and FedRamp.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
About the RoleBusiness Wire's Chief Information Security Officer (CISO) is responsible for advancing and managing a comprehensive information security practice protecting customers, partners, and company digital assets.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Information Security Specialist, you will be responsible for ensuring the security of our existing and new platforms, products, and services. 2+ years of experience in an information technology/security role.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The ServiceNow Security Engineer's primary role will involve providing development (configuration) support as a member of an Agile Design or Development Scrum team, focusing on the configuration and management of security settings within the ServiceNow platform to ensure the integrity, confidentiality, and availability of information.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Tools Solutions Architect Peraton Peraton drives missions of consequence spanning the globe and extending to the farthest reaches of the galaxy. We are looking to add an Information Security Tools Solutions Architect to the team.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Must possess recognized industry certification such as Certified Ethical Hacker, Certified Information Systems Security Professional (CISSP) or Offensive Security Certified Professional (OSCP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Computing services on Amazon Web Services, Google Cloud, Microsoft Azure) and virtualization technologies to include VMware and Hyper-V. Examine and analyze network and data flow diagrams, information security policies/processes, vulnerability management processes, and risk assessments for information security compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Possess a breadth of knowledge and experience across the information security domain, such as endpoint security, cloud security, application security, or automation. CERT-CSIH, GCIH, GCIA, GCFA, Security+, ECIH, GX-IH, OSCP, GPEN, CEH, CISSP etc.
ExpandApply NowActive JobUpdated 8 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Collaborate with internal departments, such as [Corporate Information Security, Product, and Operations], to enhance fraud prevention and detection strategies. - A bachelor's degree in computer science, information security, cybersecurity, intelligence studies, or a related field or equivalent work experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As Product Manager, Security Analytics, you’ll report into the Senior Director of Product Management. Senior Product Manager, Security Analytics. As a member of the security product team, your responsibilities will include helping to execute the product strategy and roadmap for the Elastic Security solution, specifically focusing on the application of analytics to customer value reports and internal product development processes.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
A foundational understanding of secure product development objectives and practices, for example: Critical Vulnerability Response & Disclosure, Application Security Testing (pen-testing), Secure Code Review, Supply Chain Risk Mitigation, Vulnerability Management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Expertise in Encryption, Key management, Cybersecurity fundamentals (e.g., access controls, common software vulnerabilities, and security standard methodologies), Deployment Methodologies, and Security Standards Compliance Certification (STIG, FedRAMP, PCI-DSS), etc.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Participate in regular security reviews, risk assessments, and vulnerability management activities to proactively identify and remediate potential threats within the microservices, APIs, and AWS infrastructure.
ExpandApply NowActive JobUpdated Today
information security jobs Title: scrum master Company: Eliassen Group in North, SC
FEATURED BLOG POSTS
How to Write a Follow-Up Email for a Job Application?
Most times, we have to do more than submit a "sugar-coated" resume to land our dream jobs. Going the extra mile to follow up on your job application can increase your chances of employment. Additionally, it may even help you get confirmation sooner on whether you are seriously being considered for the job or not.
How to Hire Remote Workers
Remote work used to be a thing of the future. However, with social, economic, and cultural events taking place across the country, it has now evolved into something that both job searchers AND companies are benefiting from. Remote work is multifaceted and can come in handy in a variety of situations. So, to help your small business take advantage of all of remote work's benefits, here is a short guide on how to hire remote workers.
How to Address a Cover Letter With Examples
It’s easy to get caught up in focusing on your resume – how it looks, what it says, and whether it’s going to land you a job interview. Because there is a big focus on building the perfect resume, job searchers often overlook the importance of a high-quality cover letter. Your cover letter plays a huge role in your first impression. It humanizes you and provides context for your resume.
How to Call Out of Work
No matter how happy we are with our jobs, there are days when we feel overwhelmed and want to call out of work. No, don't feel guilty. It's expected because we're humans, and we can't control the uncertainties of life. But the problem lies in how to call out of work without seeming uncommitted to work, especially if you seldom get work-free days.
What is Seasonal Employment?
Depending on where you are in your career, you might have first-hand experience with seasonal employment. Seasonal employment can be a great way to expand your skill set and earn extra cash while helping businesses meet seasonal increases in demand.
How to Ask for a Letter of Recommendation
When the job board you subscribe to finally posts your dream job, you may feel like the stars have aligned. But part of securing a position that matches your career plan is ensuring you address all the application basics. You know, the resume, the cover letter, the portfolio. It seems like you've got this in the bag — until you realize they want a letter of recommendation, too!
What Are SMART Goals?
When it comes to achieving our goals, there’s a lot of noise to work through. A study by the University of Scranton has found that only 8% of people who set New Year’s resolutions actually achieve them. Our busy lives might be one reason for this. Another, even more important reason, is our approach to goal setting. Being too vague, too ambitious or simply unclear on the timeframe can set us up for failure.