THE LARGEST COLLECTION OF JOBS ON EARTH
information technology
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
Description We are searching for an experienced Application Security Architect who can utilize solid business knowledge and expert technical experience in security to help develop strategy, roadmap and execution for our ..
Sign In or Sign Up in seconds to view this job on EmploymentCrossing.
... most complex new and existing information systems applications to ensure that ... efficient and accurate, and that information systems procedures are in compliance ... of variable factors. Responsibilities Humana's..
Job Information Humana Information Technology Risk Oversight Lead in ... South Carolina Description The Lead, Information Technology Risk Oversight, identifies, analyzes, ... of risk that pertain to information technology. Coordinates..
Description The Finance Management Professional is a key business support function for the Humana IT Team. This role serves as a strategic finance partner for the Infrastructure and Operations group through ..
NCKYGiYno1-323003-en_US Solutions driven success. XPO is a top ten global provider of transportation services, with a highly integrated network of people, technology and physical assets. At XPO Logistics, we look for ..
Description The Lead, CyberSecurity Policy and Standards evaluates, tests, recommends, develops, coordinates, monitors and maintains information systems (IT) and cyber security policies, procedures and systems, including access management for hardware, firmware ..
Job Information Humana Lead Information Technology Compliance Professional in Charlotte ... most complex new and existing information systems applications to ensure that ... efficient and accurate, and that information systems..
Job Information Humana Lead Information Technology Compliance Professional in Lancaster ... most complex new and existing information systems applications to ensure that ... efficient and accurate, and that information systems..
Information Security Risk Analyst LendingTree is ... is continuing to grow its Information Security team with the addition ... with the addition of an Information Security Risk Management Analyst. This..
Remote Information Security Analyst needs 2 -4 ... Analysis and Event handling Remote Information Security Analyst requires: Demonstrated experience ... experience and knowledge in applying Information Security Principles Excellent communication..
... assessments Bachelor's Degree in Business, Information Technology, or a related field ... Master's Degree in Computer Science, Information Technology, Information Security or a related field ... transformation, ambiguity, and..
Description As an Information Security Engineer, you will partner with various stakeholders to build solutions to protect our members, associates, and assets. Working closely with teammates, you will build new security ..
Job Information Humana Health Information Management Specialist (HIMS) - CenterWell ... assembles and maintains patients' health information in medical records and charts. ... and signed. Enters all necessary information into..
... assists in improving the overall information security posture while enabling business ... will ensure business compliance with Information Security Policies and Standards while ... the Security program Implement the..
... proud of. As the Lead Information Security Compliance Analyst, you will ... managing the governance of our information security program. On our team, ... with other members of the..
Job Information Humana Information Technology Risk Oversight Lead in ... North Carolina Description The Lead, Information Technology Risk Oversight, identifies, analyzes, ... of risk that pertain to information technology. Coordinates..
Description The Lead, IT Compliance audits the most complex new and existing information systems applications to ensure that appropriate controls exist, that processing is efficient and accurate, and that information systems ..
... The Assistant Vice President of Information Security will assume responsibility for ... adequately protected. The AVP – Information Security will perform risk assessments ... will perform risk assessments of..