- UpvoteDownvoteShare Job
- Suggest Revision
Provide Leadership to the Department: lead and champion organizational change; encourage participation in activities that support relationship development; champion information security and risk management innovation; demonstrate and champion the following characteristics in fulfilling the responsibilities of the job - passion, empowerment, accountability, collaboration and ethics.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The position will be located at Wright-Patterson Air Force Base. The candidate would be undertaking the development and delivery of documentation, reports, technical data and other product deliverables necessary to support system security analysis and certification analysis in the management, modification and acquiring ground stations and platforms supported by the Tanker Recap/NGAS program.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Successful candidates for this role will coordinate with the Corporate Risk Management Framework Support Center, Information System Security Officers (ISSOs), & other ISSMs across the company, to obtain and maintain certifications and accreditations under the new Defense Counterintelligence and Security Agency (DCSA) Risk Management Framework.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This is a hands-on position that requires practical experience in the areas of information security, privacy, risk management, and compliance. The individual will be accountable for building and leading a corporate information security program to execute and deliver the following capabilities: IT systems security assessments, risk assessment and analysis, remediation prioritization, security operations, security policy development, security awareness training, security audits, certification, and compliance management.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
We are seeking a Technical Program Management (TPM) leader to spearhead our Information Security programs, focusing on safeguarding applications, data, IAM, and cloud. The TPM will manage multiple programs including IGA (Identity Governance & Administration) , PAM (Privileged access Management), RBAC (Role Based Access Control), DnR (Detect & Respond / Security Event Monitoring), AI Security, API Security, DLP (Data Loss Monitoring) and Data Security Fabric.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Excellent foundation for various technical Information Security topics such as system- and network security, risk management, identity and access management, cryptography, physical security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Explore more InfoSec / Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Information Security Engineer will manage all aspects of infrastructure systems used to manage vulnerability management tools & resources. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Have a minimum of 5-8 years of risk management, data governance, policy management, information security compliance, privacy compliance, internal audit, external audit, and/or information security experience.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
As an Information Security Engineer, Vulnerability Management you will be responsible for developing, implementing, and maintaining the organization's vulnerability management strategy.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum 10 years of experience in information security management. Certified Information Systems Security Professional (CISSP), Certified Information Security Manager (CISM), Certified Information Systems Auditor (CISA) or other similar credentials.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
3+ years of experience in utilizing security relevant tools, systems, and applications in support of Risk Management Framework (RMF) to include: NESSUS, ACAS, DISA STIGs, SCAP, Audit Reduction, and HBSS.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Minimum of 5 years of experience with any combination of the following: mobile security, threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network security.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Will work in the Information Security Delivery Risk & Compliance team in the CISO organization. This role will require active collaboration with a variety of different technology teams within AFS IT, AFS Information Security, AFS Technology Growth Platform, and Accenture Information Security to promote secure engineering practices.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Chief Information Security Officer (CISO) and Head of Enterprise IT. Chief Information Security Officer (CISO)/Head of Enterprise IT. Reporting directly to the Chief Product and Technology Officer, you will be responsible for overseeing all aspects of information security, including Cloud Security, DevSecOps , Security Operations, and Security Strategy.
ExpandApply NowActive JobUpdated Today
security management information jobs in Greendale, WI
FEATURED BLOG POSTS
Virtual Reality Job Interviews
With the advent of desktop computers, the arduous task of scouring through weekly job classifieds became a thing of the past. The mid-1990s brought about a new era where job seekers could easily search and apply for jobs online. The introduction of AOL's Instant Messaging feature provided an even faster means for employers and candidates to communicate and schedule interviews. As smartphones became more pervasive in the early 2000s, hiring managers increasingly used phone calls for screening and interviewing candidates. Despite this trend, over 80% of interviews still took place in person.
A Potential TikTok Ban?!
As you may already know, there has been a lot of talk lately about the possibility of a TikTok ban. While this has not yet come to fruition, it's important to consider the implications this could have for businesses and recruiters who rely on TikTok as a platform to market their brand, recruit new talent, and connect with their audience.
The Effects of Workplace Racism and Sexism
One day it's a covert statement to a mother returning to work after maternity leave. Another day it's a lingering gaze at an employee enjoying a culturally rich meal. These microaggressions (or sometimes macroaggressions) can take an employee from a confident, high-performer to one that feels insecure being themselves at work. Your employees engage with people with different ideas and feel most comfortable and valued when they can work without losing their cultural, racial, and gender identity. While most employers know this, why have workplace racism and sexism often been neglected?
When Rage Applying Strikes: How to Identify Unserious Candidates
As the job market remains highly competitive, we have seen a surge in "rage applying." This is when candidates apply to multiple jobs, often without considering whether they are truly interested in the role. Rage applying goes hand-in-hand with quiet quitting. Often, employees want to entertain the thoughts and feelings of leaving their job, but they aren't necessarily serious about leaving yet. Meanwhile, other employees engaging in this trend are actually trying to find a better role. As a recruiter, it can be hard to identify who are the real applicants in a sea full of quiet quitters, but understanding rage applying and identifying red flags will certainly help.
How to Increase Job Ad Exposure
In today's competitive job market, writing quality job ads is critical for attracting top talent to your organization. While networking and candidate referrals are prime real estate for finding qualified candidates, nothing beats the tried-and-true method of writing an extraordinary job ad. But while writing a great job ad is the first step, what's more important is increasing visibility. You could have the most detailed, well-written ad on the internet, but if no one sees it, then you are wasting time (and potentially money!). Employers often believe that job boards are the root of the problem, but you can learn how to increase job ad exposure by tweaking a few steps of your recruitment process.
How to Navigate Hiring Out of State
The job market has shifted significantly in recent years. The accelerated adoption of technology has not only pushed many companies into remote working arrangements but also increased the availability of supporting tools and technologies (i.e., video conferencing and collaboration software).
Building a Candidate Pipeline Through Internships
Building a candidate pipeline through a great internship program for local college students and recent graduates at local universities is a great and cost-effective way to attract and retain top talent. By offering meaningful and impactful work experiences, regular feedback, coaching, and mentorship, you can create a positive internship experience that will make your organization a sought-after destination for future employees. This not only benefits the organization in the short-term but also in the long-term, as you'll have a pool of well-trained and experienced candidates who may be interested in full-time employment once they graduate. Furthermore, building relationships with local universities and college students can increase brand awareness and build a positive reputation for your organization in the local community.