- UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s degree in the following disciplines: Information Security, Computer Science, Management of Information Systems, or related field required – masters’ degree preferred. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
With our business reach, we cover satellite television service, live-streaming and on-demand programming, mobile plans and products, smart home installation services and, now, we are building America’s First Smart Network.
$20.25 an hourFull-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Their responsibilities include: Installing, testing, troubleshooting, repairing or replacing cryptologic networks, physical security systems, electronic equipment, antennas, personal computers, auxiliary equipment, digital and optical interfaces, and data systems Configuring, monitoring and evaluating Information Operations (IO), Information Warfare (IW) systems and Information Assurance (IA) operations Cryptologic Technician Collection (CTR) – CTRs serve as experts in intercepting signals.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The NCSIS portfolio encompasses modeling and analytics for transportation logistics and supply chain security; critical infrastructure cybersecurity; artificial intelligence/machine learning for cybersecurity, nonproliferation, and other relevant missions; autonomous cyber defense and situational awareness; cybersecurity workforce development; and knowledge discovery and management systems, among others.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Set overall IT cyber security strategy including efforts to reengineer and optimize business processes and systems by assessing business needs and developing, proposing and implementing technology solution options.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Certifications required (two), preferred certifications: Certified Information Systems Auditor (CISA), Certified in Risk and Information Systems Control (CRISC), Certified Cloud Security Professional (CCSP), or equivalents.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Bachelor’s Degree in Information Security, Information Systems, Information Assurance, Computer Science or related field, or relevant experience and/or education as determined by the company in lieu of bachelor's degree.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Cybersecurity PMO coordinates with project-implementing divisions, provides oversight of cybersecurity investments to the client’s leadership, advises the Chief Information Security Officer (CISO) and Chief Information Officer (CIO) on IT investments, and provides recommendations to leadership on Cybersecurity portfolio prioritization.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Fortune Brands Outdoors & Security (Fiberon/Master Lock/Therma-Tru Doors) is an equal opportunity employer. Provide daily support to the Supply Chain and Transportation operations with focus on Inbound Ocean - network, freight costs, service optimization, and overall continuous improvement.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
The role will report directly into the VP of Information Security, Technology and Enterprise Applications and will be responsible for overseeing Security Operations, Application Security, and IT Risk and Compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
This role will also be responsible for processing, verification of the dealer finance contracts and loan disbursements in a timely manner and will serve as a liaison between Consumer Loan Fulfillment and its dealer network.
Full-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The Sanofi CHC's Data Privacy Team consists of a Global Data Privacy Officer, a network of Local Privacy Officers (‘LPO’) with regional, sub-regional or country oversight, and a Global Privacy Office with global oversight.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
At Lightspark, we are pioneering the future of payments by leveraging the Bitcoin network and diving deep into the capabilities of the Lightning Network. Incident Management: Lead the coordinated response to security incidents from detection to remediation, root cause analysis, and prevention.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Nuclear Medicine Technologist – Health Advocates Network is urgently hiring Nuclear Medicine Technologist with at least 2 years of recent experience! Health Advocates Network-Allied is seeking a travel Nuclear Medicine Technologist for a travel job in Franklin, Wisconsin.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
In addition, an Application Security Engineer must foster constructive dialogue and seek resolution when confronted with discordant views. At least 4 years of experience with dynamic application security, web, API or mobile security, secure coding, or software development or a combination of.
$165,100 a yearExpandApply NowActive JobUpdated Today
network security jobs Title: systems administrator Company: Palo Alto Networks in Hales Corners, WI
FEATURED BLOG POSTS
Hiring Transparency
Transparency in hiring refers to the open and honest communication and information sharing that takes place between employers and job candidates. It encompasses all aspects of the hiring process, from posting job descriptions to providing feedback on performance during and after the interview process. In today's job market, hiring transparency has become increasingly important for both employers and candidates alike.
Recruitment strategies that are weird, but actually work
In the current candidate-driven job market, recruiters are looking for unique ways to attract talent. Some have resorted to even (dare we say it?) recruitment strategies on the border of weird and wacky. What can we learn from the unusual recruitment tactics that are being used and actually getting results? Here’s a rundown of some unique recruitment strategies that actually work.
How To Make $100K a Year – No BS Strategies & Advice
If you’re like most of us, you’d love to be wealthier. Having more money would alleviate stress. It would make it easier to pay your bills and buy nicer things. Maybe it’d allow you to spend more time with your kids and go on more vacations. You’re not alone if you wish you could somehow earn a more significant income.
How to Write a Recommendation Letter for a Student
When a student applies for their first job or for their next academic degree, they don’t have much experience to showcase their skills and personal qualities. Hiring managers and admissions officers, therefore, often look at recommendation letters as a way to go beyond the student’s GPA and learn more about the student’s skills and personal qualities.
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
What is Career Cushioning?
Is your organization prepared for “career cushioning”?
How to Gracefully Quit a Job You Just Started
You’ve just started learning the ropes at your new job, and you've gotten to know your colleagues. But you’re already thinking about quitting. Maybe you were deciding between to job offers and realized that you’ve made the wrong choice. Or, a change in your personal circumstances means that you have to quit.