THE LARGEST COLLECTION OF JOBS ON EARTH
information technology
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
... Management Lead oversees various projects and/or programs of a highly complex ... nature, works within specific guidelines and procedures. The IT Project Management ... IT Project Management Lead assembles..
... positions: Cybersecurity Auditor, Policy Analyst, and Project Management Business Analyst (PMBA). ... exception granting, responding to external and internal audit requests, and prepare governance and compliance management reports. The..
... positions: Cybersecurity Vulnerability Management (CVM) and Technology Infrastructure. The CVM CE ... window of opportunity for attackers, and continuously acquire, assess, and take action on new information ... new..
Description The Senior Software Engineer (Web, Mobile, iOS, Android) ... (Web, Mobile, iOS, Android) codes software applications based on business requirements. ... on business requirements. The Senior Software Engineer work..
... I) positions: Cybersecurity Technology Applications and Technology Infrastructure. The Technology Applications ... support to the cybersecurity applications engineering team to include: setting up, ... to include: setting up, configuring,..
... with available technology including hardware, software, databases, and peripherals. Translates business needs into ... peripherals. Translates business needs into technical systems solutions. Integrates hardware, software and network interfaces to..
... Business Information Security Officer (BISO) and is responsible for support to ... support to the team, tools, and processes necessary to continuously acquire, ... necessary to continuously acquire, assess..
... (CO I) positions: Governance, Risk, and Compliance (GRC) Tool Analyst, Supply ... Analyst, Supply Chain Risk Analyst, and Application Security Officer (ASO) . ... staff, system points of contact,..
... analysis of threats, applying system and network controls, and engineering technical solutions based on a thorough ... understanding of persistent threat tactics and techniques and the organization's infrastructure. The..