Search results for Information Security

Certification Of PCI-DSS Requirements

The Payment Card Industry Data Security Standard (PCI DSS) is an information security standard for organizations that handle branded credit cards from the major card schemes.The PCI Standard is mandated by the card brands and administered by the Payment Card Industry Security Standards Council. The standard was created to increase controls around cardholder data to reduce credit card fraud. Validation of compliance is performed annually or quarterly, either by an external Qualified Security Assessor (QSA) or by a firm specific…
Full Description of Certification of PCI-DSS requirements

Cyber Security Analyst

Seeking a Cyber Security Analyst (CSA) to provide technical analysis for IA/CS support and integration efforts. The CSA will perform in-depth analysis in various areas and technologies for DIACAP Certification and Accreditation (C&A) / RMF Assessment and Authorization (A&A). Responsibilities Reviews, updates, validates and authors Cybersecurity procedures (SOPs) as required. Reviews and maintains an inventory of authorized software. Reviews and maintains an inventory authorized external (USB) devices and media. Audits and validates configurations deployed on laptops, workstations, and servers. Audits…
Full Description of Cyber Security Analyst


In the event you might want fantastic work with a quick pivot at a reasonable cost, so get in touch with me. You will be highly satisfied when you get the result. I work from my heart and it enables me to deliver the best. Here are some expertise in my working skills: *** Web/Market Research, Crawl Scraping, Google Drive *** Real Estate, Lead Generation, Business Plan, AD Posting *** Email Response Handling & Marketing *** Data Analysis, Data Entry,…
Full Description of Engineer

Information Security

This position will allow you to use your expertise developing, implementing and ensuring compliance of IT solutions. Responsibilities: Review HIPAA breach notification rule policies and procedures. Review policies and procedures related to HIPAA Security Rule physical, administrative and technical safeguards. Provide compliance reports and participate in regular compliance meetings to discuss issues and mitigation strategies. Respond to Individuals’ privacy concerns regarding unauthorized access by family members, friends, or others. Assess and audit security requirements by studying business requirements; conducting system…
Full Description of Information Security

Information Security Analyst

Essential Job Functions: Plan, implement, upgrade and monitor all security measures for the complete protection of company’s computer networks and retail platform for e-commerce websites for company’s products by Javascript, PHP and SQL. Monitor and manage server logs and traffic patterns to prevent application and network level cyber-attacks by Java and Wireshark; analyze vulnerability reports from anti-virus software such as MacAfee and install security patches Python and Microsoft Excel. Ensure appropriate security controls are in place that will safeguard digital…
Full Description of Information Security Analyst

Information Security Consultant

As an Information Security Consultant, you will deliver risk and compliance services/assessments to mitigate existing and future security risks. You will also propose security controls for long-term solutions in a Healthcare environment, while working closely with clients and partnering with your internal Leadership team and colleagues. Conduct information security risk assessments based on industry standards (HIPAA/HITRUST, NERC, PCI-DSS, GLBA, FFIEC, SOC2, NIST, ISO) Respond to advisory service requests to address and answer client questions and/or needs Provide information security management…
Full Description of Information Security Consultant

Information Security / Customer Service Rep

This role is able to autonomously manage and own numerous multiple-solution customers and related demands with ease. CSRs are often times the go-to person for challenging day-to-day and complex internal or external scenarios. The ability to seek and accept feedback from others while learning to provide similar feedback constructively is an important part of this role. A CSR plays an integral part in meeting all company goals: Guarantee satisfaction and value for our customers Contribute to a work environment that…
Full Description of Information Security / Customer Service Rep

IT Cyber And Security Information Intern

You will work towards improving Company-wide solutions and contribute ideas & support to improve our data and security program. Throughout the internship you will learn to measure and monitor the progress and status of our initiatives & gain real time experience with a variety of security tools and enhance processes to drive security program value in our organization. Who are you? Concise communicator Analytical-minded & solution-dedicated Able to grasp & apply new concepts Determined to achieve results Developed time management…
Full Description of IT Cyber and Security Information Intern

It Support

i am an it speacialiste i have lot of expérience in in information technology field i have ccna and ejbt certificat i can help people to improve their secyrity and fix their probleme with internet i can test peoples website to see if they are secure and did not have any security problemes
Full Description of it support

Looking For A Network Security Consultant With Snort Installation Experience

Looking for a network security consultant with Snort installation experience. We want to implement Snort into our platform, but need the guidance of a consultant to help us. Please apply if you have experience with Snort. Preferred candidates will be video interviewed via Skype.
Full Description of Looking for a network security consultant with Snort installation experience

McAfee Klantenservice Nederland

Mijn naam is Ranya Smeeks en ik woon in Den Haag, Nederland. Ik heb engineering gestudeerd aan de Universiteit van Amsterdam en werk nu samen met hotmail als technisch ondersteuningsingenieur.
Full Description of McAfee klantenservice nederland

Network Penetration & Security Assessment Proeject

A leading Cybersecurity Solution Provider is seeking an Experienced, Certified, Freelance (Project Based) Network & Infrastructure Penetration Tester / Ethical Hacker******This is for an immediate requirement. Must be avaliable now Career opportunities******************Prime responsibility is to simulate Gray Box / Black Box attacks on client’s Networks, Firewalls, Web Servers or any other device or appliance discovered during the reconnaissance. Identify vulnerability and Exploitation and Documenting of the finding as final report. Must be comfortable in technical communications skills. Clients interaction very…
Full Description of Network Penetration & Security Assessment Proeject

Penetration Tester Wanted For Websites

Penetration tester wanted for websites. We have several clients who want to test their website's security and for this we need penetration testers. We will provide you with website and details of what needs to be done. If possible, we will agree on terms and fees. Please contact me if you have highly experience in this. Thank you
Full Description of Penetration tester wanted for websites

Scientific Article About Hot Topic In Information Security

I need a Scientific paper to be written about a hot topic in information security, a problem and suggested scientific solution, it should include all the needed drawings, formulas and reference should be no less 2015, the ide should be a genuine one and not less than an article written by an Msc holder in that field.
Full Description of Scientific Article about hot topic in information security

Security Of Information

As a language service provider we work closely with our clients on translation of sensitive documents including PHI and Financial information. Recently clients are asking us to improve our IT security, and I have several vendor questionnaires on my desk that we need to complete successfully in order to keep their business, which means that we have to upgrade our systems to something approaching ISO 27001. 1. Assist in the development of information security program to contain: a. Security Management…
Full Description of Security of Information


© 2005 - 2021
15,609 contracts/jobs/projects currently available in our database.

There are 3 users online now.
Most online ever was 1923.