- UpvoteDownvoteShare Job
- Suggest Revision
Technology Consultant - Cyber Security – Identity & Access Management (IAM) (Manager)(Multiple Positions) (1506970), Ernst & Young U.S. LLP, Boston, MA. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of cybersecurity functions such as asset management, identity and access management, cloud security, network security, security operations, and incident response, and technologies such as SIEM, EDR, IPS/IDS, SAST, DAST, CASB/DLP, CSPM, or CWPP.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Lead the design and implementation of identity management systems, tools, and technologies, ensuring scalability, security, and usability. Lead a team of identity management professionals, providing guidance, mentoring, and performance feedback to ensure the team's success.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Work with HCSC senior management, the Corporate Compliance Officer and Corporate Privacy Officer to support the various enterprise-wide Privacy committees. Provides development, guidance and assistance in the identification, implementation and maintenance of HCSC’s information privacy policies and procedures in coordination with HCSC’s management and administration, the Privacy Advisory Committee and legal counsel.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
RVO Health was created by joining teams from both Red Ventures and UnitedHealth Group’s Optum Health. Professional certifications (e.g., CISSP, CCSP, OSCP, GIAC). Working familiarity with Terraform, Github, and DevSecOps.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of information security toolsets including anti-virus, Vulnerability Assessment, HIDS/ NIDS, host-based or endpoint security solutions, Multi Factor Authentication (MFA), and Security Incident and Event Management (SIEM ) and centralized auditing tools.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Experience implementing security solutions for enterprises (e.g., threat detection and hunting, malware intelligence, cloud security posture management, or identity management). Within the range, individual pay is determined by work location and additional factors, including job-related skills, experience, and relevant education or training.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
In addition, the role will provide consultation and advise on risk management related matters, support the local implementation of the risk management framework including operational resiliency and cyber risk frameworks and make recommendations where appropriate to mitigate risk.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In conjunction with IT Risk Management, oversee the remediation of information security related findings identified by Internal Audit, IT Risk, and Third Party Risk Assessments. Additionally, this role will lead the continuing maturation of Ryan Specialty’s cyber risk management efforts, consisting of internal risk management and external Third-Party risk management programs.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Controls and processes include but are not limited to: incident response, asset inventory, vulnerability management, patch management, application security, logging and monitoring, findings governance and remediation, identity and access management, configuration management, and change management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Working knowledge in identity and access management principles, networking routing techniques, social engineering, Advanced Persistent Threat (APT) and gateway anti-malware. Identify, define and document emerging system security weaknesses and threats and recommend solutions to management.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
As our customers needs changed throughout the years, we expanded our services and became Custom Express, a reliable logistics partner for air freight delivery, local cartage, inventory management, and short-term storage solutions.
Full-timeExpandUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As necessary, writes and revises the following plans: Emergency Response (in tandem with Safety department), Chemical Approval Handling & Management, SPCC, SW3P, Lead based Paint Operations, Air Compliance/Air Permits, Water Conservation, Waste Minimization, Wetland Mitigation and Destruction Prevention, Hazardous Material Security Plan.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
10+ years of proven experience in physical security management, with a focus on risk assessment and mitigation. Bachelor's degree in security management, criminal justice, or a related field.
ExpandApply NowActive JobUpdated 3 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience building and optimizing best practice Enterprise Risk Management, Third Party Risk Management, Risk Quantification, as well as Data Governance and Artificial Intelligence (AI.
ExpandApply NowActive JobUpdated Yesterday
management job Title: management training Company: Feed in Franklin, WI
FEATURED BLOG POSTS
How to Make a Job Offer More Competitive
Money alone makes it hard to attract and retain top-notch candidates, especially when you are competing with larger businesses and corporations in your industry. So, instead of focusing on money, figure out how to make a job offer more competitive when you can't offer more money.
5 Ways to Stretch Your Hiring Budget
Many businesses across the country have adjusted business operations to make it through the pandemic. After a period of hardship, many business owners, like yourself, are ready to start recruiting and rebuilding a bigger, more skilled workforce - only now you have to do it with a smaller hiring budget.
How to Ask for a Raise at Work
Here we go again; it’s time to talk money. Whether you’re one year in at a new company or approaching year five on the same team, learning how to ask for a raise should be part of your long-term career plan. These conversations are rarely fun (thanks to society, which has conditioned us to believe that money is taboo), but they are necessary if you want to, well, get paid what you’re worth. Trust us, there’s a lot of money on the table for taking. Below, we’ll discuss tips on timing, approach, and follow-up.
Technology in the Workplace: How to Improve your HR Function with AI
It’s safe to say that the last two years have brought fundamental changes to the way we work and do business. Companies have relied on technology in the workplace to digitize their services and build a remote-friendly infrastructure that could prepare them for the future.
How to Maximize Action Verbs in Your Resume
Writing a resume that stands out takes more than using keywords and savvy formatting. It’s not just about having an impressive list of accomplishments. It’s also about how you position them using action verbs and deliberate word choice. So if you are looking for a way to craft a resume that stands out and gets calls back? Start by sprucing up your resume with captivating action verbs.
What is Your Desired Job Title?
You’ve decided to look for a new job. So now comes the question — what is your desired job title? There are lots of considerations to think through when deciding on the right title for your next role.
4 Things to Consider When Building a Global Workforce
The rise of remote work has given employers a unique chance to rethink how they approach workforce management. This ranges from rethinking the size and design of their office space to updating their tech stack to accommodate different working styles. It has created new opportunities for companies of all sizes to expand their hiring pool and look for top talent on a global scale.