Featured Job
-
Job Removed or Not Found
Related Jobs
- Magellan Health, Inc. (Frisco, TX)
- …10+ years' experience leading projects or project teams in a similar environment at the advanced level. 10+ years' experience in IT or cybersecurity. Demonstrated
- Fifth Third Bank (Cincinnati, OH)
- …include developing and executing audit planning, fieldwork, reporting and wrap-up activities on each engagement in accordance with established standards. Individuals in
- UT Health San Antonio (San Antonio, TX)
- …Reporting to the Clinical Information Officer (CIO), the Clinical Information Technology Project Manager - Associate will champion, establish and reinforce Project
- Novo Nordisk Inc. (Plainsboro, NJ)
- …developing and implementing security controls and formulating operational risk mitigations. Relationships: Reports directly to the manager of Global Security Operations -
- Applied Information Sciences (Reston, VA)
- …Due to restricted access needed to perform the work, US Citizenship is required. Required Qualifications: Education & Experience: Bachelor's degree in computer
- BOK Financial (Tulsa, OK)
- …Responsible for overall coordination, status reporting and stability of project oriented work efforts and establishing and implementing project management processes and
- Cantalician Center for Learning (Buffalo, NY)
- …Supervise, mentor, and develop IT Specialist I and II, fostering a collaborative and high-performing team culture. Recruit, hire, and oversee staff in key leadership and
- Headquarters, NASA (Washington, DC)
- …include establishing strategy, policies, programs, and frameworks for the security of classified and unclassified information and information systems at NASA. Also,
- HCI Systems (Ontario, CA)
- …Oversee IT operations for three companies, supporting 1,000+ users across California and throughout the US Lead and supervise a team of four support technicians, offering
- The CERES Group (Boston, MA)
- …ESSENTIAL RESPONSIBILITES: Risk Management Responsible for the development and oversight of the company's information security and risk management methodologies,