Key Responsibilities:Implement and manage security measures for information systemsConduct vulnerability assessments and penetration testsDevelop and maintain security policies in compliance with regulationsRequired Qualifications:4 years of experience as a CSSSBachelor's degree in Computer Science ...
As the Information Security Risk Management Specialist, you will utilize your wide area of expertise in risk management, security frameworks, regulatory compliance, cybersecurity, vulnerability management, disaster recovery and business continuity planning, incident management, and other areas to pr...
Role: Security ArchitectLocation: Austin, TXDuration: 6+ months. ...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
Job details:Role: Security ArchitectLocation: Austin, TXDuration: 6+ months Summary of This Role Security Engineer with Tenable Nessus Security Center knowledge. The individual needs a comprehensive understanding of Tenable Nessus Security Center, usage to assess the benchmark compliance of various ...
Guards monitor and assist with the security and protection of the. One or more years of experience as a security guard or police officer. As a guard, you are expected to provide friendly and quality information to students, employees, and visitors to The University of Texas at Austin. Monitor and as...
Chief Data Security Officer, Chief Data Officer, Chief Digital Officer, Chief Privacy Officer, CIO, Chief Security Officer, Chief Risk Officer, VP of IT Security and Privacy, VP of IT Infrastructure, VP of IT Operations, VP of Cybersecurity, VP of Risk Management, VP of Data Privacy, VP of Privacy C...
Under the guidance of Director of Information Security, the Cyber Security Engineer will be responsible for administering and implementing enterprise information security architecture and technology solutions to address the emerging security and compliance needs of the business. Provide input into a...
Chief Technology Officer, VP of IT, Director of IT, VP of IT Operations, Director of IT Operations, Chief Information Officer, IT Manager, IT Consultant, Chief Data Officer, Chief Security Officer, Technology Manager, IT Operations Manager, Information Systems Manager. Legal, Information Technologie...
Chief Data Security Officer, Chief Data Officer, Chief Digital Officer, Chief Privacy Officer, CIO, Chief Security Officer, Chief Risk Officer, VP of IT Security and Privacy, VP of IT Infrastructure, VP of IT Operations, VP of Cybersecurity, VP of Risk Management, VP of Data Privacy, VP of Privacy C...
A company is looking for a Lead Offensive Security Engineer. ...
A company is looking for a Systems Administrator Remote. ...
A company is looking for a Security Engineer II - Cyber Security Operations Center. ...
A company is looking for an Analyst of Reporting and Data Enablement. ...
A company is looking for an Offensive Security Engineer. ...
A company is looking for an Oracle Cloud Infrastructure - Security Specialist. ...
A company is looking for a Senior Data Analyst, Marketing. ...
A company is looking for an Information Security Analyst I. ...
Security Program Analyst in the Pacific/Mountain region for a remote position. ...
A company is looking for a Security Analyst II. ...
A company is looking for a Security Architect for Attack Surface, Cloud, and AI. ...
A company is looking for an Associate Cyber Security Engineer. ...
A company is looking for a Senior Data Analyst I in Washington DC or Remote. ...
Key Responsibilities:Actively search for internal and external threats and provide 24/7 Cyber Security Operations Center supportMentor security analysts and lead Incident Response coordinationMonitor the effectiveness of the Enterprise-wide information security programRequired Qualifications:Minimum...
An organization is seeking an Information Security Analyst II. ...