Skip to content
Head of Business Development - Industrial Cybersecurity Date: Jun 9, 2024 Location US Company: Black & Veatch Family of Companies Together, we own our company, our future, and our shared success. As an employee-owned company, our people are Black & Veatch. We put them at the center of everything we do and empower them to grow, explore new possibilities and use their diverse talents and perspectives to solve humanity's biggest challenges in an ever-evolving world. With over 100 years of innovation in sustainable infrastructure and our expertise in engineering, procurement, consulting and... more ->
Company Description McDonald's evolving Accelerating the Arches growth strategy puts our customers and people first and demonstrates our competitive advantages to strengthen our brand. We are recognized on lists like Fortune's Most Admired Companies and Fast Company's Most Innovative Companies. Doubling Down on the 4Ds (Delivery, Digital, Drive Thru, and Development) Our growth pillars emphasize the critical role technology plays as the best-in-class, global omni-channel restaurant brand. Technology enables the organization through digital technologies, and improving the customer, crew and... more ->
Indiana Tech is a thriving, independent, teaching-oriented institution with a focus on career-oriented programs in business, engineering, information technology and computer science, criminal justice, life sciences, human services, and many other concentrations. Indiana Tech enrolls nearly 1,500 students in its traditional undergraduate programs on its picturesque main campus and nearly 5,000 students in its College of Professional Studies programs online and onsite at 15 regional locations. Degrees are offered at the associate, bachelor, master, and doctoral levels. Over 41% of our students... more ->
We believe in the power and joy of learning At Cengage Group, our employees have a direct impact in helping students around the world discover the power and joy of learning. We are bonded by our shared purpose - driving innovation that helps millions of learners improve their lives and achieve their dreams through education. Our culture values diversity, engagement, and discovery Our culture values diversity, engagement, and discovery Our business is driven by our strong culture, and we know that creating an inclusive and diverse workplace is absolutely essential to the success of our company... more ->
Make a Difference. Secure Our Future. From Fundamentals to Frontlines: Launch your cybersecurity career as an Information Security Risk Analyst at Deluxe Unleash Your Inner Cyber Sleuth: start your Information Security journey at Deluxe Description The Information Security Risk Analyst conducts risk assessments, generates risk reporting and metrics, and participates in risk management activities. This position will be responsible for assessing information security risks and facilitating remediation of identified information security risks. Conduct information security pre-production and... more ->
Description Are you interested in creating new IT security capabilities and learning new cybersecurity technologies? Do you want to have a stake in the overall security posture and assessment of the IT infrastructure? If so, we're looking for someone like you to apply and join our team at APL! We are seeking a Senior Systems Security Administrator (SSA) to be part of APL 's Classified IT Services team. We provide technical expertise to meet compliance and security objectives in environments consisting of Computer Network Defense (CND) tools such as Endpoint Security Solutions (ESS), Assured... more ->
Job Summary: Be a key player in our Information Security team as a Remediation Analyst, focused on strengthening our cybersecurity posture. In this role, you'll collaborate closely with system owners, taking charge of remediation efforts for findings identified by our Information Security department. Your role is crucial in ensuring our systems adhere to top-tier security standards. If you're passionate about translating security insights into actionable solutions and enjoy the challenge of securing digital landscapes, we invite you to join us. Apply now and be instrumental in fortifying our... more ->
Apply Job Type Full-time Description Who we are At Applied Network Solutions (ANS), we bring together some of the most curious minds in networking and cybersecurity. ANS was founded to disrupt the status quo. For over 20 years, our team provides expertise in network, system engineering and both offensive and defensive cybersecurity operations. What we do Our vision is for a future in which talent and customers alike come to ANS because of our reputation for delivering technical excellence, solving our nation's toughest challenges and our ability to exceed expectations. Why ANS At ANS we value... more ->
Pivot Point Consulting enables healthcare organizations to realize the most value from their technology and resources through Managed Services, Data & Analytics, EHR, ERP, Advisory, Virtual Care and Cybersecurity services. Its award-winning industry experts deliver Consulting, Managed Services and Talent Solutions to providers, payers, life sciences and technology organizations. The firm is currently ranked #1 Best in KLAS: Managed IT Services and has been repeatedly recognized as a top performer by KLAS in multiple categories, including #2 Best in KLAS: Partial IT Outsourcing (renamed... more ->
NO SPONSORSHIP Operational Risk Management and Controls Looking for is a person who is in audit or compliance who is familiar with cybersecurity concepts, cloud migration, and wants to develop in risk or a risk it person who wants to broaden Archer is a plus but not necessary Salary: $87k - $100k plus 15% bonus LOCATION: Chicago IL Hybrid 3 days onsite and 2 days remote All about enterprise risk management technology experience with GRC systems Archer is a plus. BS degree technology risk security Risk All IT and security risk certifications highly preferred This role will help with the risk... more ->
Infrastructure Cloud Governance Engineer (CGE) focuses on Azure Infrastructure Governance. This enterprise role is a hands-on technical role with a focus on the enforcement and remediation of Enterprise and Cybersecurity Standards across Azure and Microsoft 365 environments. In this role, you will be working with Principal Cloud Architects, Cybersecurity Teams, and other Cloud Engineers to implement Governance, Automation, and Observability Solutions which will maintain Penske's Enterprise Standards & Cybersecurity for Azure and Microsoft 365. This will include the use of Azure Active... more ->
Description Job Title: Security Administrator - Level 4 -5 Salary Range: Level 4 - Min.: $76,001 Max.: $108,573 Level 5 - Min.: $86,703 Max.: $123,862 Dept/Div: MTA Information Technology/IT Security Supervisor: Cybersecurity Officer/Manager Location: 2 Broadway and other locations as required Hours of Work: 9:00 AM -5:30 PM (8 hours/day) or as required This position is responsible for the administration of access to the railroad's computer systems on all computing platforms, administration of the various Firewall and network technologies utilized to protect the perimeter of the network from... more ->
Wor-Wic Community College is accepting applications for part-time instructors to teach computer studies courses, advise students and review curricula. Courses may be held in-person and/or online during the day or evening and include Ethics in Cybersecurity; Introduction to Web Development; Approaches to Problem Solving; Introduction to Programming (Python); Introduction to Hardware/Software (A+ Certification required); Introduction to Networking (Network+ Certification required); Website Content Management (requires proven experience with WordPress); and/or Computer and Network Security... more ->
Overview: GovCIO is currently hiring for an Information Systems Security Officer (ISSO) to provide Cyber Security support for the 39 IOS (US Air Force Cyber & IO schoolhouse). This position will be located at Hurlburt Field, Florida and will be an onsite position. Responsibilities: Responsibilities: Provide extensive engineering, technical, and operational analytical support services. This includes performing in-depth technical assessments of vendor solutions, malware reverse engineering, network and cloud analytics, and emerging technology in support for Defensive Cyber Operations Training.... more ->
Job Description Description: Oracle Health Client Advocacy and Compliance Strategy (CACS) under Security and Compliance Organization focuses on protecting client healthcare data through secure healthcare applications, networks, and communications as it relates to clients' regulations, standards, policies, and operational mandates. We manage client relationships to strategize, prioritize and meet contractual obligations for security compliance. CACS has an opportunity available for an experienced energetic, motivated, cyber security analyst to support our federal and commercial customers. The... more ->
Why choose between doing meaningful work and having a fulfilling life? At MITRE, you can have both. That's because MITRE people are committed to tackling our nation's toughest challenges-and we're committed to the long-term well-being of our employees. MITRE is different from most technology companies. We are a not-for-profit corporation chartered to work for the public interest, with no commercial conflicts to influence what we do. The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise... more ->