As a Signal Operations Support Specialist, you'll maintain vital signal support systems and terminal devices; the equipment that needs to consistently work in order for commanders to stay informed, track, and direct the...
Bachelor's degree* in Information Security, Cyber Security, Digital Forensics, Information Assurance, or Information Technology related field, OR bachelor's degree with 15 credit hours in Cyber Security, Information Assurance, or Informational...
The CTO will oversee and coordinate both Information Technology and Cybersecurity efforts for the organization and the identification of emerging technologies, security initiatives and the development of standards for both. Implement and support...
Chief Information Security Officer (CISO) Vistrada is looking to hire a strong Chief Information Security Officer (CISO). The CISO will provide strategic cybersecurity guidance and oversight to Vistrada clients by leading...
Reports to: CFOAbout AlphaSense:AlphaSense is a market intelligence platform used by the world's leading companies and financial institutions. Since 2011, our AI-based technology has helped professionals make smarter businessdecisions by delivering...
Chief Information Security Officer OFFICE OF LABOR RELATIONS Full-Time Location: MANHATTAN Exam May Be Required Department: Deferred Compensation Salary...
Consultant - Chief Information Security Officer Arootah is a premier alternative investments advisory and executive coaching firm that empowers finance executives and their teams to unlock peak performance in all...
Pay Range: $50-$60/hr Hybrid up to 4 days a week on site in New York office Occasional travel to Greenwich office may be required. Description The Team and Your...
Open Until Filled GENERAL DESCRIPTION: The Chief Information Security Officer will be responsible for supervising all technology matters related to the Wyoming Stable Token, in accordance with laws and...
Senior Specialist Info Sec Analyst The Bank has established baseline standard for controls, including resolution of security vulnerabilities, which serve to minimize residual cyber risk. Utilizing a risk prioritized approach based upon...