- UpvoteDownvoteShare Job
- Suggest Revision
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Compliance and Investigations, 8) Operations Security, 9) Physical (Environmental) Security, 10) Security Architecture and Design, 11) Telecommunications and Network Security.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Conduct host forensics, network forensics, and log analysis in support of incident response investigations. Utilize our technology platforms and security tools to conduct large-scale investigations and collect/examine endpoint and network-based evidence.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Holistic oversight over cyber & data risks/security topics: setting the vision in line with global Cybersecurity and Data strategy, providing directions and support to relevant cyber & data security initiatives in the Governance domain and its satellite initiatives.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Extensive knowledge and experience with developing Cloud Security Frameworks using industry best practices such as those from the Cloud Security Alliance (CSA) and NIST (National Institute of Standards and Technology) CSF (Cyber Security Framework) and regulatory requirements such as HIPAA, HITRUST, and PCI-DSS.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Minimum ten years of recent experience with at least three of the following: Security Architecture, threat modelling experience, identity management and authentication, software development, cryptography, penetration testing, cloud security, mobile security, and network security.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As the Expanse Security Director, you will spearhead security initiatives for a large multi-national healthcare organization spanning the US and UK. You’ll be driving the security program to drive a key clinical solution (GCP/Expanse EHR) and leverage your extensive experience in compliance/control frameworks, software security, identity and access, network security, vulnerability management, incident response and also cloud posture management.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position will support the BT Risk Manager in the management and administration of the Cyber/Risk Management program and Governance Risk and Compliance (GRC) processes and tools. The Sr. Cyber Security Risk Analyst will partner with all appropriate parties which includes, but is not limited to: other departments, service providers, application service providers, technology staff, etc.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ideally 5+ years of experience with increasing responsibility in areas such as cyber security threat or risk assessments, third party risk assessments, and/or open-source intelligence analysis.
Full-timeExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
U.S. Data Security (“USDS”) is a standalone entity of TikTok in the U.S. This new security-first division was created to bring heightened focus and governance to our data protection policies and content assurance protocols to keep U.S. users safe.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Communicate the same to a network of cyber security practitioners across Xerox for awareness and/or action to mitigate the threat(s). The Cyber Threat Intelligence Lead works with the cyber defense team to make accurate, risk-based decisions on where to focus security efforts that will protect our employees, operations, and revenue streams to yield the highest ROI from expended security resources.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
CISSP, Relevant GIAC Cert, SSCP, CISM, CCSP, CEH, CPT, CWSP, CCNP Security, CCIE Security or Relevant Professional certifications in Cyber Security OEMs. Educatingsales teams on Cyber Security solution selling and key technologies through 1x1 training, team training,and company training.
ExpandApply NowActive JobUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Demonstrated knowledge via certifications in cloud platforms and/or cyber security; examples include AWS Certified Solutions Architect, AWS Security Specialty, Certified Kubernetes Administrator (CKA), Certified Kubernetes Security Specialist (CKS.
ExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Manager, Incident Response is responsible for both working independently and leading a team of security professionals who respond to cyber-attacks, network intrusions, and computer crimes.
Full-timeExpandApply NowActive JobUpdated 25 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Consult with the ICN leaders, professionals, and various Risk & Brand Protection compliance groups (Anti-Corruption, Cyber Security, CoRe Procurement, etc.) Independence & Conflicts Network (ICN) - one of R&BP's six pillars.
$66,200 - $135,800 a yearFull-timeExpandApply NowActive JobUpdated 1 month ago
network support cyber security jobs Title: specialist cyber security in Tennessee
FEATURED BLOG POSTS
How to Be More Articulate and Speak More Clearly
Have you ever had those moments when you're talking to someone and have no idea what they are saying? The best response you can muster up is a simple head nod or blind agreeance?
How to Ask for a Higher Starting Salary
Maybe you think you’ve finally found your dream job. Everything about it is perfect, except… the salary. Unfortunately, it just isn’t where you want it to be. So, should you give up and move on? Given all the effort you’ve already invested, it’s probably wise to try and negotiate a better salary before you do.
How to Pass a Personality Test with Flying Colors
Whether you’re applying for your first job or looking to move up the career ladder, personality tests aren’t usually the first thing we think about. But surprisingly, they can have a massive impact on how our future employers perceive us. In fact, a 2017 study by the Society for Human Resource Management (SHRM) has found that 32% of U.S. employers use personality tests when hiring for senior management positions, and 28% use them for middle management positions. Personality tests are also used for hourly workers and contractors, though less frequently.
10 Practical and Effective Strategies to Persuade Anyone of Anything
Learning how to persuade people is like a key that can unlock any door. Acing the interview for the job of your dreams. Getting the best deal on a new car. Closing a sale with a skeptical customer. All of these wins require a level of persuasiveness.
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.