Appropriately document risks customer has accepted ownership for Support IT Roadmap to drive Upsell/Cross-Sell and Prevent Churn: Our customers succeed in achieving their business goals when they have an IT solution that is robust enou[...]
Other locations
which may include incident management, problem management, request management, change management, service level management and configuration management as well as resource coordination, client management, dispute and technical resoluti[...]
Additionally, the successful candidate will be: - Methodically empirical and experimental in approach and evaluation without being bound by over paralysis-by-analysis;- Work ceaselessly to improve knowledge of the security field, threa[...]
Lead a team of engineers responsible for server patching across physical, virtual, and cloud environments. Design and execute a cloud-native deployment strategy, ensuring efficient and secure application delivery across cloud platforms[...]
Identify and escalate potential issues and risks as applicable. Plan and assign work to your team members. Prepare and present your team's progress and status reports. Plan resource capacity and prepare work pipeline.Managing multiple [...]
Position overview Reporting to the manager, security operations, the Coordinator, Security Operations will be tasked with managing Security Programs, administering access levels, overseeing operations, building relationships, supportin[...]
Here's what would be included as a part of your typical day Cyber Security: Navigates through multiple pillars of cyber security including identity and access management, data loss prevention and security and log management controls an[...]
Staff - Non UnionJob CategoryM&P - AAPSJob ProfileAAPS Salaried - Information Systems and Technology, Level DJob TitleCybersecurity Systems Administrator IIDepartmentCybersecurity Systems SupportCompensation Range$8,063.17 - $12,575.08[...]
intrusion detection logs and other data collected by City systems, which entails a detailed review of all pertinent traffic and transactions on any given system or network within the City. Executes risk assessments to determine the sec[...]
Posting Details Position Information Job Title Cybersecurity Analyst II EXISTING CNC CUPE Employees: For all Administrative postings please disregard the following statement. For CUPE postings please refer to Article 9.01 (d) of the CU[...]