The IS&C Senior Manager will lead and oversee all regulatory examinations, audit requests pertaining to information security, and various cybersecurity risk assessments, cybersecurity maturity assessm...
read moreFunctional title - Information Security Risk Manager. Monitoring - Review metrics, external events, and escalation reports to monitor risk and control-related developments, issues, and trends in the m...
read moreThe IT Audits Program Manager specializing in Information Security and Privacy Regulations will oversee and manage the audit processes related to IT systems, information security, and privacy regulati...
read moreReview and Credible Challenge - Provide independent review and effective challenge of the IT Security department's information security risk profile and all associated framework components, e. Monitor...
read moreProgram Manager - Information Security. Build and lead a team of project managers, providing mentorship, professional development, and performance management. Bachelor's Degree in Computer Science, In...
read moreProgram Manager - Information Security. Build and lead a team of project managers, providing mentorship, professional development, and performance management. Bachelor's Degree in Computer Science, In...
read moreThis role is responsible for maintaining IBKR’s formal information security controls framework and representing IBKR’s cybersecurity controls to Information Security stakeholders outside and within th...
read moreThis role is responsible for maintaining IBKR’s formal information security controls framework and representing IBKR’s cybersecurity controls to Information Security stakeholders outside and within th...
read moreThe Manager of Information Security & Compliance will assist in developing and implementing security policies and align organizational practices with industry frameworks such as ISO 27001, ISO 9001, S...
read moreProgram Manager - Information Security. Build and lead a team of project managers, providing mentorship, professional development, and performance management. Bachelor's Degree in Computer Science, In...
read moreCertifications such as CISSP, Certified Information Security Manager (CISM), Amazon Web Services (AWS) Certified Security – Specialty, Azure Security Engineer is preferred. KPMG is currently seeking a...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreThe Information Security Manager will manage and evaluate vulnerability and technology risks, implement risk mitigation strategies, and safeguard the Bank from potential informational security threats...
read morePlan, manage, and deliver end-to-end information security projects, including risk assessments, vulnerability management, incident response readiness, and compliance initiatives. Strong knowledge of c...
read moreManager, Information Security Office. At least 1 year of experience performing security risk assessments and security architecture reviews. Influence customers to leverage security capabilities and so...
read moreManager, Information Security Office. At least 1 year of experience performing security risk assessments and security architecture reviews. Influence customers to leverage security capabilities and so...
read moreIT and security experience in Security Operations in a lead capacity. Security Operations (Engineering) Manager. Comfortable bridging the gap between engineering and security by advocating secure codi...
read moreCertifications such as CISSP, Certified Information Security Manager (CISM), Amazon Web Services (AWS) Certified Security – Specialty, Azure Security Engineer is preferred. Manager, Information Securi...
read moreCertifications such as CISSP, Certified Information Security Manager (CISM), Amazon Web Services (AWS) Certified Security – Specialty, Azure Security Engineer is preferred. Manager, Information Securi...
read moreExecutive members use the CyberEdBoard engagement platform to further enhance their professional brands, create and exchange member-exclusive resources, obtain accredited education and content, contri...
read moreExecutive members use the CyberEdBoard engagement platform to further enhance their professional brands, create and exchange member-exclusive resources, obtain accredited education and content, contri...
read moreComfortable bridging the gap between engineering and security by advocating secure coding practices, automated security testing, and DevSecOps principles. IT and security experience in Security Operat...
read moreThe IT Audits Program Manager specializing in Information Security and Privacy Regulations will oversee and manage the audit processes related to IT systems, information security, and privacy regulati...
read moreExecutive members use the CyberEdBoard engagement platform to further enhance their professional brands, create and exchange member-exclusive resources, obtain accredited education and content, contri...
read moreAbout Us Collaboration, Intelligence, and Leadership CyberEdBoard is the premier member’s-only community of executives & thought leaders in the fields of information security, cybersecurit...
read moreWe are seeking an Information Security Manager to collaborate with the Group Chief Information Security Officer and analysts in developing, implementing, and managing the organization's Information Se...
read moreWe are seeking an Information Security Manager to collaborate with the Group Chief Information Security Officer and analysts in developing, implementing, and managing the organization's Information Se...
read moreIndustry certifications, such as Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certified Information Security Manager (CISM), Certified Inf...
read moreIndustry certifications, such as Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), Certified Information Security Manager (CISM), Certified Inf...
read morePrepare and present regular reports on the status of the information security program to senior management. The ideal candidate will have a strong background in information security management and ext...
read morePrepare and present regular reports on the status of the information security program to senior management. The ideal candidate will have a strong background in information security management and ext...
read moreInformation Security or Technology Risk Management experience. Information Security and Technology Risk Management. Broad understanding of information security disciplines with emphasis on resiliency,...
read moreBachelor's Degree in Risk Mgmt, Information Security, Business, or related field; advanced degrees (e. Technology Control Management is looking for a manager of Governance focused on ensuring control ...
read moreInformation Security and Technology Risk Management. The Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and ...
read moreCenter 3 (19075), United States of America, McLean, VirginiaSenior Manager, Information Security Office (ISO) Assurance Team Lead. Professional certifications such as AWS Certified Solutions Architect...
read moreCenter 3 (19075), United States of America, McLean, VirginiaSenior Manager, Information Security Office (ISO) Assurance Team Lead. At least 8 years of experience working in cybersecurity or informatio...
read moreMANAGER, INFORMATION SECURITY II WHAT IS THE OPPORTUNITY? Information Security Manager II (Administrative Services Management) is a SME and supporting role in the Information Security program under Ad...
read moreMANAGER, INFORMATION SECURITY II WHAT IS THE OPPORTUNITY? Information Security Manager II (Administrative Services Management) is a SME and supporting role in the Information Security program under Ad...
read moreUtilize technical domain expertise in data management, information security, infrastructure or network operations to drive policy adherence and maintain sustainable risk based solutions. In this role,...
read moreUtilize technical domain expertise in data management, information security, infrastructure or network operations to drive policy adherence and maintain sustainable risk based solutions. In this role,...
read more