THE LARGEST COLLECTION OF IT JOBS ON EARTH
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
Description We are searching for an experienced Application Security Architect who can utilize solid business knowledge and expert technical experience in security to help develop strategy, roadmap and execution for our ..
... Summary The Vice President of Information Security Risk will assume responsibility ... adequately protected. The VP – Information Security will lead and perform ... and perform risk assessments of..
SC-10511-1 Daily duties/ responsibilities: Under limited supervision, collaborate with all Information Technology (IT) teams to vet, strategize and deploy SCJB applications. Ensure current and future application platform integrity, ability and performance ..
Type of Requisition: Regular Clearance Level Must Be Able to Obtain: Secret Job Family: Database Analysis/Design ARMA Global is seeking a qualified candidate to provide Database Manager provides services to support ..
... The Assistant Vice President of Information Security will assume responsibility for ... adequately protected. The AVP – Information Security will perform risk assessments ... will perform risk assessments of..
Job Information Humana Information Technology Risk Oversight Lead in ... South Carolina Description The Lead, Information Technology Risk Oversight, identifies, analyzes, ... of risk that pertain to information technology. Coordinates..
... has significant experience in data protection solutions, Unix, scripting, automation and ... together handling all of data protection needs at Humana from inception ... navigate the future of data..
Description This is a Work from Home / Remote Optional Position In this role, you will be defining and operationalizing secrets governance framework and data security metrics for Humana. You will ..
Job Information Humana Senior, Data Protection Engineer (Remote Optional) in Lancaster ... or platforms? The Senior Data Protection Engineer guides cross-functional development teams ... with embedding privacy and data protection..
... direct report to the Chief Information Security Officer (CISO), the Vice ... provide thought leadership to Enterprise Information Protection leadership team to mature the ... of technical leadership experience..
... assessments Bachelor's Degree in Business, Information Technology, or a related field ... Master's Degree in Computer Science, Information Technology, Information Security or a related field ... transformation, ambiguity, and..
... Portfolio Management - Cyber Data Protection develops and executes on programs ... systems. The Director, Cyber Data Protection Management requires an in-depth understanding ... Portfolio Management - Cyber Data..
... looking for a Senior Data Protection Engineer who will be responsible ... cloud(s), and implementation of Data Protection methods. As a Senior Data ... methods. As a Senior Data..
... can define and operationalize data protection & privacy controls across the ... responsible for the enterprise data protection’s technical oversight on architecture and ... of related security tools, data..
... limited to DHEC Office of Information Technology (Client), Program Areas within ... agency initiatives and adhere to Information Technology and security standards to ... security policy design related to..