Job added in hotlist
Applied job
Contract job
90-day-old-job
part-time-job
Recruiter job
Employer job
Expanded search
Apply online not available
View more jobs in Detroit, TN
View more jobs in Tennessee

Job Details

Director Cyber Security -Architecture and Engineering

Company name
Detroit Tigers, Inc.

Location
Detroit, TN, United States

Employment Type
Full-Time

Industry
It, Executive, Manager, Engineering

Posted on
Jun 17, 2021

Apply for this job






Profile

:text,ActualValueFromSolar:null},{QuestionName:Job Description,AnswerValue:\u003cp\u003e\u003cspan style=\font-size:11pt\\u003e\u003cspan style=\line-height:normal\\u003e\u003cspan style=\tab-stops:5.5in\\u003e\u003cspan style=\font-family:Calibri,sans-serif\\u003e\u003cb\u003e\u003cspan style=\font-size:14.0pt\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003eBuild a Bigger, Better, Bolder Future\u003c/span\u003e\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\font-size:11pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\line-height:107%\\u003e\u003cspan style=\font-family:Calibri,sans-serif\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:black\\u003eImagine working for a company that measures its success based off the growth of its colleagues, a company that invests in its future by investing in you. Little Caesars is a company where our colleagues make an impact. \u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cb\u003e\u003cspan style=\font-size:14.0pt\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:black\\u003eYour Mission:\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eThe main objective of the Director, Cyber Security -Architecture and Engineering is to oversee the development, implementation and maintenance of cyber security solutions that promote interoperability and manageability throughout the systems development life cycle and networking environments. Additionally, the role will support the identification and remediation of application-level vulnerabilities while meeting our organization’s risk management needs and business requirements. The Cyber Security -Architecture and Engineering Director is also responsible for the broader vision of how the organization’s cyber security related architecture and engineering function must continue to evolve and improve over time by maintaining a multi-year capability improvement roadmap of prioritized projects and associated resource and funding requirements for inclusion into the broader cyber security strategy and roadmap.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\u003cbr\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cb\u003e\u003cspan style=\font-size:14.0pt\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:black\\u003eHow You’ll Make an Impact:\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/p\u003e\u003cul\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDefine, communicate, and drive the deployment and adoption of consistent security architecture practices and solutions to promote interoperability and manageability.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDesign and develop cyber architecture standards and practices as well as enablers and processes for maintaining architectural artifacts.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eProactively ensure inclusion of security standards and alignment with technical and reference architectures.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDesign and develop a DevSecOps strategy and manage implementation for the systems development lifecycle (SDLC) process.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDesign, develop and implement a Cloud Security strategy to ensure protection and availability of assets hosted in cloud environments.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eContinuously identify opportunities in new and existing architecture to incorporate innovative approaches including identity and access management, cloud security architecture, mobile platforms and secure web gateway (e.g. API security).\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eIdentify and evaluate tools and techniques to capture, model and analyze security architecture options.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDevelop and provide security implementation guidance to other business entities within the organization.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDevelop standard metrics and KPIs for compliance with security architecture standards compliance and policies.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eEnsure solutions are in alignment with business needs, organization architectural principles, security protection requirements and required functionality throughout the systems development life cycle.\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eCollaborate with stakeholders to understand business needs.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eMaintain and update architecture and technologies standards, run books and inventory against cybersecurity frameworks.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eSupport design and development of network, systems and data availability, resiliency, recovery and recovery testing.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eIdentify and evaluate existing or new application security technology (code scanners, etc.) to be used and build, maintain and run those technologies.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDesign and develop targeted training for cloud, application security (technical and best practices).\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eActively communicate and keep abreast of the latest trends in cybersecurity architecture, risk management and cloud and application security.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eFacilitate meetings with business and IT members and participate in projects relating to changes in security architecture and solutions.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eAdvise on application security requirements and considerations in alignment with emerging needs of the business.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eProvide inputs and adapting technologies configurations as needed for evolving regulatory and compliance needs.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cspan style=\font-size:11pt\\u003e\u003cspan style=\font-variant-ligatures:normal\\u003e\u003cspan style=\text-decoration-thickness:initial\\u003e\u003cspan style=\text-decoration-style:initial\\u003e\u003cspan style=\text-decoration-color:initial\\u003e\u003cspan style=\font-family:Calibri,sans-serif\\u003e\u003cb\u003e\u003cspan style=\font-size:14.0pt\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003eWho You Are:\u003c/span\u003e\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003cul\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eBachelor’s degree in Computer Science, Information Systems, Engineering, Information Security, Cyber Security, or a related field is required.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eMinimum of 10 years of relevant work experience in cybersecurity architecture, engineering application security or similar.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience designing and deploying security architectures.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience collaborating on architecture and engineering design options, implementation, testing and user acceptance.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience developing and operating secure SDLC programs.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience architecting secure solutions in the cloud environment including Infrastructure as a Service (IaaS), Software as a Service (SaaS) and Platform as a Service (PaaS).\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience interacting with development teams to articulate requirements and processes.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience identifying, evaluating, and managing risk in a complex and changing environment.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eWorking knowledge of NIST, Open Web Application Security Project (OWASP) and Open Source Security Testing Methodology Manual (OSSTMM).\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eAn understanding of emerging technology and digital trends and their impacts on cybersecurity.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eStrong understanding of risk-based decision-making.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eDeep understanding of the operational impacts of cybersecurity lapses.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eHigh level of time management, organizational skills, and attention to detail.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eProven ability to communicate complex information, concepts, or ideas in a confident and well-organized manner through verbal, written, and/or visual means.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eAt least one of the following certifications is required CISSP, CCNA, CCENT, CCNP, GSEC, MCSA, CASS, GWEN. CSSLP, ECSP.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cul\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-variant-ligatures:normal\\u003e\u003cspan style=\text-decoration-thickness:initial\\u003e\u003cspan style=\text-decoration-style:initial\\u003e\u003cspan style=\text-decoration-color:initial\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eExperience working on a global team is preferred.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e\u003cbr\u003e\u003cspan style=\font-size:11pt\\u003e\u003cspan style=\font-family:Calibri,sans-serif\\u003e\u003cb\u003e\u003cspan style=\font-size:14.0pt\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003eWhere You’ll Work:\u003c/span\u003e\u003c/span\u003e\u003c/b\u003e\u003c/span\u003e\u003c/span\u003e\u003cul\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003ePosition requires working non-traditional hours, as needed, including evenings, weekends, and holidays.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eThis position may require minimal travel to vendor locations, assessment at stores and Ilitch Companies facilities, data centers or seminars/networking.\u0026nbsp;\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eRequires extended periods of time sitting and talking on the phone.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003cli style=\margin-left:8px\\u003e\u003cspan style=\font-size:12pt\\u003e\u003cspan style=\background:white\\u003e\u003cspan style=\tab-stops:list .5in\\u003e\u003cspan style=\vertical-align:baseline\\u003e\u003cspan style=\font-family:\u0026quot;Times New Roman\u0026quot;,serif\\u003e\u003cspan style=\border:none windowtext 1.0pt; font-size:11.0pt; padding:0in\\u003e\u003cspan style=\font-family:\u0026quot;Century Gothic\u0026quot;,sans-serif\\u003e\u003cspan style=\color:#121212\\u003eWorks in a normal office environment where there is no physical discomfort due to temperature, noise, dust, and the like.\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/span\u003e\u003c/li\u003e\u003c/ul\u003e,VerityZone:jobdescription,QuestionType:textarea,ActualValueFromSolar:null},{QuestionName:Req Number,AnswerValue:5770BR,VerityZone:autoreq,QuestionType:text,ActualValueFromSolar:null},{QuestionName:City,AnswerValue:Detroit,VerityZone:formtext6,QuestionType:text,ActualValueFromSolar:null},{QuestionName:State,AnswerValue:Michigan ,VerityZone:formtext2,QuestionType:single-select,ActualValueFromSolar:null},{QuestionName:Posted Job Title,AnswerValue:Director, Cyber Security -Architecture and Engineering,VerityZone:formtext7,QuestionType:text,ActualValueFromSolar:null},{QuestionName:Business Unit,AnswerValue:Little Caesars ,VerityZone:formtext3,QuestionType:single-select,ActualValueFromSolar:null}],GQId:2989,isGQResponsive:true,isActive:true,isSocialReferralJobRestricted:false,localeId:1033,AutoOptionalReqId:5770BR,Title:Director, Cyber Security - Architecture and Engineering,JobSiteId:6894,Link:https://sjobs.brassring.com/TGnewUI/Search/home/HomeWithPreLoad?partnerid=26290\u0026siteid=6894\u0026PageType=JobDetails\u0026jobid=946230,isEverGreen:false},JobDetailFieldsToDisplay:{Position1:formtext3,JobTitle:formtext7,Position3:[formtext5,formtext6,formtext2],Summary:jobdescription,Section2Fields:[autoreq,jobtitle,formtext4]},BrandingConfiguration:{\brandingSettings\: {\Responsive_AdvancedCSS\: \\,\Responsive_BackgroundColor\: \#FFFFFF\,\Responsive_BackgroundImage\:
one\,\Responsive_BaseFontColor\: \#000000\,\Responsive_BaseFontFamily\: \Arial, Arial, Arial, sans-serif\,\Responsive_BaseFontSize\: \16px\,\Responsive_ButtonBackgroundColor\: \#000000\,\Responsive_CompiledCSS\: \/* remember to define focus styles! */input,select,.control,.ui-selectmenu-button,textarea,.pseudocheckbox,.pseudoradio,.controlWrapper,.textAreaWrapper,.lightBorder,.themed .ui-selectmenu-button,.ui-state-default { border-color: #000000;}.baseFontColor { color: #000000;}.baseColorPalette { background-color: #ffffff; color: #000000;}.accentBkg { background-color: #e6e6e6; color: #000000;}.lightAccentBkg { background-color: #f0f0f0;}.veryLightAccentBkg { background-color: #f7f7f7;}.darkAccentBkg { background-color: #bfbfbf; color: #000000;}.ghostBorder { border-color: #737373;}.gateway.themed .accentBkg .borderInAccentBkg { border-color: #bfbfbf;}.linkColorOnBkg { background-color: #ffffff; color: #363533; border-color: #363533; outline-color: #363533;}body,.ui-widget-content a,input,.ngdialog.ngdialog-theme-default[role=#Q#dialog#Q#] .ngdialog-content { font-family: #SQ#Helvetica Neue#SQ#, Helvetica, Arial, sans-serif; font-size: 16px;}body,.pageHeader,button,.menu,.dialog .region,.dialog .body,.gateway .baseColorPalette,.ui-widget-content,.facet ul.liner,.ngdialog.ngdialog-theme-default[role=#Q#dialog#Q#] .ngdialog-content { background-color: #ffffff; color: #000000;}.themed .pageHeader { background-color: #000000;}.themed .headerLink { color: #000000;}.themed.pageFooter { background-color: #000000;}.themed.pageFooter .footerLink,.themed.pageFooter .tgLocale { border-color: #E0E0E0; color: #ffffff;}.themed.pageFooter a { color: #ffffff; border-color: #ffffff;}.themed.pageFooter i { display: inline-block; color: #ffffff; border-color: #ffffff;}svg.styleableColor path,svg.styleableColor rect { fill: #000000; stroke: #000000;}a,a:visited,.link,.gateway.themed .linkColor,.jobtitle,.gateway .baseColorPalette a,.gateway .baseColorPalette a:visited,.facetFilterAccordion h3:after { color: #363533;}a.sidebarNav,.gateway .sidebarOverlay .sidebar { background-color: #ffffff;}.backLink { color: #363533;}.cue,.prompt,[disabled],::-webkit-input-placeholder,:-moz-placeholder,::-moz-placeholder,:-ms-input-placeholder { color: #737373;}.foreground { color: #000000; background-color: #ffffff;}.foreground span,.foreground a,.foreground a:visited { color: #000000;}.gateway.themed .controlWrapper span,.gateway.themed .controlWrapper a,.gateway.themed .controlWrapper a:visited { color: #000000;}.themed .hover,.menu a:hover { background-color: #f7f7f7;}.ui-state-hover { outline-color: #000000;}.striped :nth-child(even),.even,.ui-menu-item.ui-state-focus,.ui-menu-item-wrapper.ui-state-active,.ui-datepicker .ui-state-default,.ui-widget-header { background-color: #bfbfbf; color: #000000; color: inherit;}.backgroundColor,.themed .down,.menu a:active,.menu a.active,.applyFlow .layoutsection .heading:before,.themed .ngdialog.ngdialog-theme-default .ngdialog-content { background-color: #ffffff;}.highlighted \u003e a,.gateway.themed .selectedTile { background-color: #e6e6e6; color: #000000;}.themed .jobdescriptionInJobDetails table thead,.themed .jobdescriptionInJobDetails table tfoot { color: #000000; background-color: #ffffff;}.themed .jobdescriptionInJobDetails table thead span,.themed .jobdescriptionInJobDetails table tfoot span,.themed .jobdescriptionInJobDetails table thead a,.themed .jobdescriptionInJobDetails table tfoot a,.themed .jobdescriptionInJobDetails table thead a:visited,.themed .jobdescriptionInJobDetails table tfoot a:visited { color: #000000;}.themed .jobdescriptionInJobDetails table tbody:nth-child(even) { background-color: #e6e6e6; color: #000000;}.themed .primaryButton { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton:hover { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton:active { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.themed .primaryButton .ladda-label,.themed .primaryButton .button-label { outline-color: #ffffff;}.themed button,a.button,.themed .AppDetailBtns .ui-selectmenu-button { border: 2px solid #000000; background-color: #ffffff; color: #000000;}.themed button:hover,a.button:hover,.themed .AppDetailBtns .ui-selectmenu-button:hover { border: 2px solid #000000; background-color: #e7e7e7; color: #000000;}.themed button:active,a.button:active,.themed .AppDetailBtns .ui-selectmenu-button:active { border: 2px solid #000000; background-color: #ffffff; color: #000000;}.themed button .ladda-label,a.button .ladda-label,.themed .AppDetailBtns .ui-selectmenu-button .ladda-label,.themed button .button-label,a.button .button-label,.themed .AppDetailBtns .ui-selectmenu-button .button-label { outline-color: #000000;}.themed .closeButton,.themed .close { color: #000000;}.themed .closeButton:hover,.themed .close:hover { background: #cccccc;}.themed .closeButton:active,.themed .close:active { background: #e6e6e6;}.themed .clearButton { color: #000000;}.themed .progressBarContainer .progressBar .meter { background-color: #ffffff; border-color: #ffffff; border-width: 14px 0 14px 0; border-style: solid;}.themed .threeLineIcon { border: 2px solid #000000; background-color: #000000; color: #ffffff;}.gateway.themed .callout { color: #ffffff; background-color: #000000;}.gateway.themed .callout::before { border-color: transparent transparent #000000 transparent;}.gateway.themed .callout::after { border-color: #000000 transparent transparent transparent;}.gateway.themed .rightIcons .bellIcon .fa-stack .fa-bell { background-color: #ffffff; color: #000000;}.gateway.themed .rightIcons .panelShow { background-color: #ffffff;}.gateway.themed .rightIcons .panelShow .fa-stack .fa-bell { color: #ffffff; background-color: #000000;}.headerStatusSticker.BorderSuccess,.jobSavedStatus.BorderSuccess { background-color: #ffffff;}\,\Responsive_FooterBackgroundColor\: \#000000\,\Responsive_FooterLinkColor\: \#FFFFFF\,\Responsive_ForegroundColor\: \#ffffff\,\Responsive_HeaderBackgroundColor\: \#000000\,\Responsive_HeaderLinkColor\: \#000000\,\Responsive_LinkColor\: \#363533\,\Responsive_PrimaryHeaderLogo\: \https://mc.lcecorp.com/ATS/Ilitch_logo.png\,\Responsive_SecondaryHeaderLogo\:
one\}},FooterInfo:[{Name:Privacy Policy,Value:https://www.lceforum.com/lceforum/Portals/0/doc/Privacy_Policy.pdf,Icon:,onlyIcon:0},{Name:Terms of Service,Value:https://www.lceforum.com/lceforum/Portals/0/doc/terms_of_service.pdf,Icon:,onlyIcon:0}],EncryptedBruid:null,HashCode:0,LoggedIn:false,EncryptedSession:null,CompiledCss:true,IdForSocialLogin:be9119e8-b3ad-42cc-85b2-649a835b8b2c,TotalCount:135,AllowAccessResponse:{Name:AllowAccess,Value:true},TalentSuiteClientName:null,ApplyStatus:null,ApplyDiff:10,NextApplyDate:null,LimitExceededMessage:null,JobId:946230,JobCartResponse:null,TGLocales:[{SiteId:6894,LocaleId:1033,LocaleName:English (United States),SiteLocaleName:English (United States),DefLangId:1},{SiteId:6897,LocaleId:3082,LocaleName:Español,SiteLocaleName:Spanish,DefLangId:27},{SiteId:6898,LocaleId:3084,LocaleName:Français (Canada),SiteLocaleName:French (Canada),DefLangId:141}],IsGTG:true,LocaleDesc:English (United States),ResponsiveCandidateZone:true,BasicProfileDetails:null,DashboardData:null,PendingAssessments:null,googlejobsMappingfielddataJson:,CustomWebTrackerResponse:[],Abc:0,SolarErrorOccurred:false} capture-escaped-parsed-value=preloadResponse />

Company info

Detroit Tigers, Inc.

The number of jobs listed on EmploymentCrossing is great. I appreciate the efforts that are taken to ensure the accuracy and validity of all jobs.
Richard S - Baltimore, MD
  • All we do is research jobs.
  • Our team of researchers, programmers, and analysts find you jobs from over 1,000 career pages and other sources
  • Our members get more interviews and jobs than people who use "public job boards"
Shoot for the moon. Even if you miss it, you will land among the stars.
InformationTechnologyCrossing - #1 Job Aggregation and Private Job-Opening Research Service — The Most Quality Jobs Anywhere
InformationTechnologyCrossing is the first job consolidation service in the employment industry to seek to include every job that exists in the world.
Copyright © 2024 InformationTechnologyCrossing - All rights reserved. 169 192