The Information Technology Analyst is a member of the Security Engineering team and be responsible for ensuring the security of information systems assets, to protect systems from intentional or inadvertent access or destruction. Represent the Global Information and Cyber Security (GICS) function in...
The IT Security Architect will also develop and execute an overall IT Security strategy and roadmap that aligns with the business and corporate strategy. Perform security assessments, identify gaps in existing security architecture, and recommend changes or improvements. Document policy, security re...
ResponsibilitiesThe ideal Information Security Engineer candidate will play a pivotal role in safeguarding PCG’s information, brand, digital assets and its people. The Information Security Engineer will be responsible for identifying gaps, vulnerabilities, and potential threats, conducting risk asse...
Information Technology/Security. Develop and follow detailed operational processes and procedures to appropriately analyze, escalate and assist in the remediation of information security-related incidents. Through a strong understanding of attacker behavior, participates in and manages security even...
The position will coordinate the development and implementation of the FNU IT portfolio while leading information security, cybersecurity, and IT risk management programs based on industry-accepted information security and risk management frameworks. The Information Security Officer will guide FNU...
What Information Security and Risk contributes to Cardinal HealthInformation Technology oversees the effective development, delivery, and operation of computing and information services. QualificationsCloud computing platforms (AWS, GCP, Azure) Cloud security tools and technologies (CloudWatch, Clou...
Role: Information Security Specialist Key Responsibilities: Develop and implement comprehensive information security policies and procedures. Requirements: A Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, with a strong emphasis on information securi...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect - Healthcare Delivery Technology serves as the most senior security architect and advance...
Description: Step into the critical and ever-evolving field of information security with our J-1 Governmental Sponsor Program, offering dynamic internship opportunities across the United States for aspiring information security professionals. As an Information Security Intern, you will delve into th...
Investigate IT-related security incidents to determine the extent of compromise to national security information and automated information systems. Cyber Security - Information Assurance Technician (IAT II)Job Category: Information TechnologyTime Type: Full timeMinimum Clearance Required to Start: T...
Description: Step into the critical andeverevolving field of information security with our J1 GovernmentalSponsor Program offering dynamic internship opportunities acrossthe United States for aspiring information security professionals. As an Information Security Intern you will delve into the pract...
Description: Step into the critical and ever-evolving field of information security with our J-1 Governmental Sponsor Program, offering dynamic internship opportunities across the United States for aspiring information security professionals. As an Information Security Intern, you will delve into th...
Frankfort, KY 40601 USA Description The Legislative Research Commission is accepting applications for the position of Information SecuritySpecialist I in the Office of Computing and Information Technology (OCIT). Manage information security policy and accompanying standards, working with all agency ...
Description: Step into the critical and ever-evolving field of information security with our J-1 Governmental Sponsor Program, offering dynamic internship opportunities across the United States for aspiring information security professionals. As an Information Security Intern, you will delve into th...
Role:Information Security Specialist Key Responsibilities: Develop andimplement comprehensive information security policies andprocedures. Requirements: A Bachelor s degreein Computer Science Information Technology Cybersecurity or arelated field with a strong emphasis on information security. This ...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technol...
Role: Information Security Specialist Key Responsibilities: Develop and implement comprehensive information security policies and procedures. Requirements: A Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, with a strong emphasis on information securi...
Description: Step into the critical and ever-evolving field of information security with our J-1 Governmental Sponsor Program, offering dynamic internship opportunities across the United States for aspiring information security professionals. As an Information Security Intern, you will delve into th...
Role: Information Security Specialist Key Responsibilities: Develop and implement comprehensive information security policies and procedures. Requirements: A Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, with a strong emphasis on information securi...
Role: Information Security Specialist Key Responsibilities: Develop and implement comprehensive information security policies and procedures. Requirements: A Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, with a strong emphasis on information securi...
A firm knowledge of security; Linux; compliance and operational security; threats and vulnerabilities; network security; application, data, and host security; access control and identity management; and cryptography. Information Security Adjunct Instructor. Information Security Adjunct Instructor. E...