- UpvoteDownvoteShare Job
- Suggest Revision
Communicate with stakeholders (Regional Training Director, Portfolio operations, Security Professionals, Supervisors, Field and Corporate Training, and Clients) Deliver field training programs in accordance with local, state, and federal laws and regulations, as well as Allied Universal standards in support of Regional Trainers.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Required 5 years - Broad, domain level architectural understanding of: •Modern Application Architecture •Cloud Computing •DevSecOps •IT Infrastructure •Network •IT Governance •IT Security. Required 5 years - Experience with architecting security designs in compliance with security regulations such as NIST, IRS, PCI, or HIPAA.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certifications such as Network+, Security+, CySA+, GDAT, GCED, CISSP are not required, but highly desirable. The Security Content Engineer will focus on mapping existing content to the MITRE ATT&CK framework, proposing new content development opportunities and collaborating with SOC team members to tune existing content and create and enhance operational documentation, to mentor members of the Content Team, the Detection Team and the Engineering Team.
RemoteExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Our athenaGives platform strives to support food security, expand access to high-quality healthcare for all, and support STEM education to develop providers and technologists who will provide access to high-quality healthcare for all in the future.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The Systems Architect/Engineer position is part of the Acquisition and Property Management (APM) Space Management Support System (SMSS) team within the Acquisition and Property Management (APM) portfolio in support of the US Department of Veterans Affairs, Consolidated Corporate Support Services (CCSS) program.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Keywords: in-house counsel, in-house attorney, legal jobs, corporate counsel, general counsel, lawyer jobs. Join a dynamic team at our Austin, TX office as a Corporate Counsel. Challenging Opportunity in Corporate Counsel Role | Austin, TX.
Full-timeExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
May assist in the development of Vulnerability Management processes in support of the Security and Data Operations Team. Bachelor's degree in information technology, information security, computer information systems, computer science, management information systems, or a related field.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
$185,800 - $255,475 a yearFull-timeExpandApply NowActive JobUpdated 10 days ago - UpvoteDownvoteShare Job
- Suggest Revision
AWS Security (GuardDuty, CloudTrail, Secrets Manager, EKS/ECR, IAM family, Config), Vulnerability management (Qualys/Nessus, Twistlock, Snyk), SIEM (SumoLogic or Splunk), Container Security, CI/CD Discipline (Helm, Terraform, Chef, Kubernetes (EKS.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Eight (8) years of experience in information security operations, information technology, and/or information security analysis management work. Possess or ability to Obtain: Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP) certification, and/or Certified Information Systems Manager (CISM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This individual should be an experienced cyber security professional with a strong understanding of how to create and lead vulnerability management programs. Proven experience in security operations, vulnerability management, or a similar position.
ExpandApply NowActive JobUpdated 6 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Maintains compliance with NERC CIP Standards, ERCOT Protocols, SOC Controls, Corporate Policies and supports internal and external audits as appropriate. Works collaboratively with architecture, cyber security, compliance, and other identified departments to mitigate and reduce IAM risks.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Use security tools such as firewall rule analyzers, vulnerability and application security scanners, pen testing software, and other similar tools to evaluate and communicate risk to Technology leadership and business stakeholders.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Certification as a Certified Information Systems Auditor (CISA), Certified Information Systems Security Professional (CISSP), Certified in Risk and Information Systems Controls, (CRISC), Certified Public Accountant (CPA) or Certified Internal Auditor (CIA) is required.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Position- Information Security Analyst Remote. Information Security Analyst will partner closely and collaboratively with Enterprise Architecture (EA), Developers, Platform Owners, and other areas of the firm to help ensure Freddie Mac provides secure services and solutions.
RemoteExpandApply NowActive JobUpdated 5 days ago
corporate security jobs Title: vulnerability management Company: Dell in Austin, TX
FEATURED BLOG POSTS
How to Fire an Employee
So… you've finally decided to let one of your employees go. Drafting the paperwork and corresponding with HR is the easy part, but knowing how to fire an employee is where things get complicated. In fact, it is one of the most challenging conversations to have in the workplace. However, it must be done, and it must be done with poise and tact. Not only should you keep your state law in mind, but you should also consider your former employee's wellbeing.
How Long Does it Take to Hear Back from a Job?
Are you applying for your very first job? Maybe you’re anticipating your termination from your current role and want to be proactive. Either way, waiting to hear back on your job application can be stressful. If time has passed since you applied, you may wonder how long does it take to hear back from a job. Well, the answer is... it depends.
How to Respond to a Recruiter Through Email? (Tips & Examples)
Rather than wading through an endless list of open roles, wouldn’t it be nice if relevant job opportunities come to you?
How to Reject a Candidate Professionally
When deciding on how to reject a candidate, your first question may be
How Does Salary Pay Work? (Compared to Hourly Pay)
At the bottom of each job advertisement, companies label a role as salaried or hourly. Both methods will get you paid (yay), but each in very different ways. So, it's essential to figure out how does salary pay work? While employees paid by the hour are paid based on how long they work, employers pay salaried employees a fixed amount.
The Quiet Quitting Phenomenon
The term, quiet quitting, was coined in 2009, but only now is it gaining traction as young Millennials and Gen Z workers are experiencing record levels of burnout. With the pandemic and the state of the economy, young employees are feeling the pressure. So, quiet quitting comes into effect when that pressure is exasperated by work stress and no managerial support.
How Does Salary Range Work (With Examples)
What are your salary expectations? Do you know? Establishing a salary that compensates you fairly and keeps you happy at work can feel like taking a shot in the dark. And employers sure don’t make learning budgets easy!