- UpvoteDownvoteShare Job
- Suggest Revision
The successful candidate will be a team player, comfortable working across a wide range of organizations and corporate functions including information technology, corporate security, vendor management, risk and audit teams, and other partners to promote vulnerability risk management practices throughout the enterprise.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
By developing security strategies; implementing policies and procedures; executing risk assessments and penetration testing; collaborating with colleagues to mitigate known and emerging vulnerabilities and threat and by briefing senior management on the company's overall risk management posture, our Information Technology Security Manager plays a vital role in protecting our organization against cyber-attacks that threaten the integrity of our data, networks and information technology assets.
$95,000 - $120,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Our award-winning threat intelligence, emergency communication, and travel risk management solutions help companies of all sizes identify, respond to, and recover from critical events faster and more confidently.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified in Risk and Information Systems Control (CRISC), or Information Systems Security Management Professional (ISSMP.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Examples would be Trade Analyst, Position Risk Management, Settlements, etc. Defining, planning, and executing end-to-end Commodity Trading & Risk Management solutions, including transaction capture, risk management, logistics, and accounting.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience in establishing and managing a data governance program, including data asset identification, policy and standards enforcement, data stewardship, data risk management, and data security and confidentiality.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The Meadows Center for Preventing Educational Risk (MCPER) at The University of Texas at Austin is currently looking for an individual to serve as reading interventionist in Hutto ISD area. Employees may be required to report violations of law under Title IX and the Jeanne Clery Disclosure of Campus Security Policy and Crime Statistics Act (Clery Act.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Manage and direct financial and business affairs for the Enrollment Management portfolio (Office of Admissions, Office of the Registrar, Office of Scholarships & Financial Aid, and Texas One Stop) overseeing and providing leadership for budget, financial and human resources operations.
$150ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Chief Information Security Officer (CISO) Reporting to the CIO, the Chief Information Security Officer (CISO) is a key role on theleadership team of the IT department. ●Working knowledge of security governance risk and compliance (GRC.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Assist the team that will document, maintain, and tune AML transaction monitoring rules, sanctions screening systems, and risk scoring models as well as detailing data lineage and model/rule assumptions and parameters for all models.
$145,000 - $192,500 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Headquartered in Hawaii, KaiHonua, LLC is a Native Hawaiian Organization (NHO) owned SBA Small Disadvantaged Business specializing in global information technology and offering professional solutions in IT Design & Installation, Cybersecurity Engineering & Support, Application Integration & Development, Software & Hardware Engineering, Network & Systems Management, Information Systems Security, and Business Management Services.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Circle is looking for a manager to join the Enterprise Risk Management (ERM) team to support the day-to-day management and operation of Circle's ERM risk lifecycle management program and supporting programs like issue management and governance.
$130,000 - $170,000 a yearFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience in Data governance/risk management practices and tools/technologies to develop and monitor metadata, lineage and data quality controls. Work with business, IT and Governance leaders to lead and develop data risk management/governance artifacts such as metadata, lineage, quality controls, user access, and issue/change management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience with any combination of the following: mobile security, threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Working in the Information Technology Department, the Systems Architect performs duties across multiple areas of information technology, such as applications, software development, computer hardware, server software, computer support, database analysis, data security, and other areas of the overall IT applications and infrastructure.
ExpandApply NowActive JobUpdated Today
cisa information security risk management framework jobs in Austin, TX
FEATURED BLOG POSTS
Internal Hiring Best Practices
Each companies hiring strategy is based on a set of rules that defines the ideal candidate. Many companies utilize internal and external hiring to ensure they have skilled, experienced workers. If you work in recruiting, maximizing your internal hiring strategies could be the key to retaining employees and simplifying your hiring process.
Why is it so Hard to Get a Job After College
For many, it was easy finding a job while in college. But after job hunting for weeks, you may wonder why it is so hard to get a job after college. After all, you’ve put a lot of time and effort into getting your degree. But don’t get discouraged. The University of Washington found that 53% of graduates are either unemployed or working a job that doesn’t require a degree. Other studies also show that landing your first job can take between 3 and 6 months. So, getting your first job takes time.
Why Leadership Is So Important in Your Career
There are plenty of baseball players worldwide, but only a select few will master the sport enough to play in the World Series. Similarly, you’ll meet hundreds of “managers” throughout your professional career. Still, only a few will cement themselves as true leaders in your mind. This is why leadership is important—the most influential leaders leave a mark. They inspire.
Making the Move to Salary Transparency
The salary transparency trend continues. Last year, Colorado passed its Equal Pay Transparency Rules, which required employers to include compensation in job postings, notify employees about promotional opportunities, and record job descriptions and wage records. Soon after, states like Washington, Nevada, Maryland, and Rhode Island followed suit.
Brand Reputation 101
People's initial perception of your organization is also known as your brand reputation. Your brand rep either encourages or discourages people from engaging with your company. This means the way people view your company will affect sales and even recruiting efforts.
Recruiting in a Tight Market
As a recruiter or employer, you know how much the economy affects your recruitment and retention efforts. You aren't just in competition with companies in your industry, but you are also fighting against inflation, recession, unemployment rates, and so much more.
How to Build a Candidate Persona
A candidate persona is a semi-fictional representation of your ideal candidate. Building a candidate persona is one of the best methods employers use to ensure their sourcing, recruiting, and hiring processes are focused. Knowing exactly what you're looking for streamlines everything and helps increase hiring confidence. So here's how to create a candidate persona and how to use it.