- UpvoteDownvoteShare Job
- Suggest Revision
We design low voltage solutions that seamlessly integrate audiovisual, physical security, structured cabling, and wireless solutions, including DAS and WiFi systems. Our experience spans Enterprise and Government clients within the Energy, Finance, Health Care, Higher Education, Manufacturing, Media & Communications, and Transportation industries.
Full-timeExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Experience working in cyber security/ data and analytics/ educational technology related fields. In the next 25 years it grew to become the most trusted and, by far, the largest source for information security training and security certification in the world reaching more than 300,000 security professionals around the world today, with around 60,000 having been granted Global Information Assurance Certification (GIAC) security certifications – the leading certification that provides assurance to employers that their people and prospective hires can actually do the job.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Skills needed include - Infra architect/Principal Engineer with SAP infrastructure/BASIS background, understands and implemented Security, MFA, Network, Load balancers hands on experience. Maintains expertise as a Subject Matter Expert in API, Microservice and enterprise integration architecture technical disciplines and defines architectural standards and best practices within those disciplines.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
The incumbent oversees enterprise security strategic input, consults with the CISO, CIO and CRO in service to our strategy, and serves as the forceful backup to the CISO as the premier executive facing off to enterprise business customers, regulatory bodies, executive management, the Highmark Health board of directors and various audit and compliance committees for Highmark Health, AHN, and all subsidiaries and enGen customer CISO leaders.
ExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Managing or using enterprise vulnerability assessment technologies, including Tenable.io, Tenable Security Center, or similar vulnerability solutions, is required. Current information security certification, including Certified Information Systems Security Professional (CISSP), GIAC certification, or Certified Information Security Manager (CISM.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Applies engineering and technical solutions to the installation, design, maintenance, backup & recovery, and security for on-premises and cloud-based databases such as SQL Server, Azure SQL Database, and AWS RDS. Supports the installation and operation of an Enterprise ERP solution ensuring data governance, security and compliance while safeguarding data privacy and mitigating risks.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Oracle Internal Audit Director Cheyenne , Wyoming Apply Now Note: This position requires U.S. Citizenship and the ability to obtain and maintain US federal government security clearance (secret level or higher.
InternExpandApply NowActive JobUpdated 11 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Support enterprise risk management practices and drive strategic mitigation planning. Continuously improve operational risk management practices with engineering teams to assist with prioritization of security debt.
ExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This position is the Agency's highest level subject matter expert for Enterprise Architecture and Infrastructure, examples include Active Directory/Azure Active Directory Design, Storage Strategy, Cloud Solutions, Network Design, DNS Strategy, Identity Management, Configuration Management, Internet of Things (IoT), Augmented Intelligence (AI), Mobility, and Automated Security Solutions.
$10,954.67 - $12,171.47 a monthExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Exposure to enterprise planning and delivery tools such as Jira or Azure DevOps. This two-year assignment will directly support the US Army Intelligence and Security Command (INSCOM) G3 ISR directorate and their need for a comprehensive, stand-alone dashboard to track operational, fiscal, and material aspects of the Army’s Intelligence, Surveillance, and Reconnaissance (ISR) programs.
ExpandUpdated 2 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working in a role such as or similar to Regional CTO, Enterprise Technology Strategist, Strategic Consultant, Enterprise Security Architect. Experience with/exposure to Endpoint Security, Cloud Security, SIEM/Log Management, Mobile Security, Identity Security, Incident Response as well as other cyber security domains.
$110,000 - $200,000 a yearFull-timeRemoteExpandApply NowActive JobUpdated 1 month ago - UpvoteDownvoteShare Job
- Suggest Revision
Ford Enterprise Technology seeks an analytical and results-driven Technology Strategist with a proven track record in technology management and strategy and operations. Working knowledge across a variety of technology topics, such as Emerging Technology Trends, IT Infrastructure and Operations, Cloud Architecture, Data and AI, and Cyber Security, to provide thought leadership and make informed technology decisions.
ExpandApply NowActive JobUpdated 4 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strong skills using various third-party office and report generation products such as Microsoft Office, Business Objects, Cognos, and Enterprise Guide. In connection with this, all employees must comply with both the Health Insurance Portability Accountability Act of 1996 (HIPAA) as described in the Notice of Privacy Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Companys Handbook of Privacy Policies and Practices and Information Security Policy.
ExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Working closely with the IT Finance and Enterprise Application teams, additional responsibilities include establishing security controls within vendor environments, assisting product owners with analysis/reporting of software licensing, and supporting the financial team to ensure purchases are accurate and fulfilled.
RemoteExpandApply NowActive JobUpdated 5 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role works closely with EIP's Threat Management and Response teams as well as other enterprise information security teams. Ability to plan, organize and prioritize engineering and security operations execution in support of monitoring and response activities that leverage threat intel and attack surface information.
RemoteExpandApply NowActive JobUpdated 4 days ago
security enterprise jobs in Cheyenne, WY
FEATURED BLOG POSTS
5 Common Interview Mistakes
Everyone's interview process is unique in some form or fashion. Like most, your interview process is crafted so you can get the most information out of your candidates to increase hiring confidence and make the right hiring decisions. However, there are often small problems in interview processes that could ultimately affect the success of hiring decisions.
How to Ask Someone to be a Reference + Email Templates
One part of the job-hunting process that frequently gets overlooked is putting together a list of good references. Most of the time we focus on creating the perfect resume, writing an awesome cover letter, and getting our hands on letters of recommendation. We think about what outfit we’ll wear to the job interview, how we’ll answer those tricky questions, and what our career plan looks like. But, in fact, having multiple references lined up who will speak favorably about you to a potential employer is critical to landing a job. This aspect of job searching really can’t be ignored.
Job Rejection Email Response with Examples
Glassdoor estimates that, on average, there are about 250 applicants for every job vacancy out there. If you’ve ever applied for a job, the odds are that you’ve received the dreaded job rejection email.
Structured vs Unstructured Interviews
The goal of an interview is to evaluate candidates based on their skills, personality, and knowledge. You want to choose the BEST candidate from your candidate pool, so the interview is something you can't mess up. As you begin planning your interview process, one of the major decisions you'll face is whether the interview should be a structured vs unstructured interview. So let's take a dive into the differences and sort out which circumstances warrant which interview process.
How to Describe Your Personality with Examples
Imagine you’re in an elevator with the CEO of your dream company and you get to talking. The conversation is going well and you start to imagine yourself working for their company when the CEO turns around and asks you “tell me a bit about yourself.” Would this catch you off guard or would you be able to give a clear and succinct description of who you are?
4 Ways to Make Your Job Posting More Inclusive
According to a Glassdoor survey,
To ATS or not to ATS
As hiring is becoming more analytical and data-driven, companies have found ways to incorporate technology to help hire and recruit more efficiently. ATS, also known as an applicant tracking system, has become one of the most widely adopted technological recruiting tools to date. In fact, according to data from Capterra: