THE LARGEST COLLECTION OF JOBS ON EARTH
information technology
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
... and storing information, communication and security. We need experts in technology ... and analytics to enhance our security posture and minimize our risk. The Director, Cyber Defense and .....
Sign In or Sign Up in seconds to view this job on EmploymentCrossing.
... maintenance and support of data security policies and procedures. The candidate must be able ... accordance with industry and compliance standards. Exercises independent judgment and decision ... in other..
... are searching for experienced Cloud Security Architect who can utilize solid ... and expert technical experience in security to help develop strategy, roadmap ... and execution for our Cloud..
... monitoring and implementing complex IT Security Programs, , as well as ... , as well as providing security governance and alignment of security resources in support of UMMS .....
Job Information Humana Information Technology Risk Oversight Lead in Bethesda Maryland ... Description The Lead, Information Technology Risk Oversight, identifies, analyzes, monitors and ... monitors and minimizes areas of risk..
... no supervision, gathers and analyzes security needs for developing and modifying ... modifying clinical, business and infrastructure security requirements in the healthcare environment. ... healthcare environment. Includes providing complex..
... accurate, and that information systems procedures follow corporate standards, regulatory requirements, and best practice ... effectively and that information systems procedures are following industry and corporate ... are following..
... JOB SUMMARY Leads and drives security risk management as part of the ... management as part of the Security Risk, Compliance and Governance team. Responsible ... Responsible and accountable..
... implementing, and enforcing information systems security policies, standards, and methodologies. Maintains operational security posture for an information system ... program to ensure information systems security policies, standards, and procedures..