|
|
|
|
|
Chief Information Technology Officer | | Compare |
Alternate job titles: Chief IT Officer | CITO | Top Information Technology Executive | Top IT Officer | Vice President of Information Technology |
Establishes and directs the strategic long-term goals, policies and procedures for an information technology department. Determines an organization's long-term systems needs and any hardware acquisitions needed to accomplish... view job details |
|
|
|
|
Chief Technology Officer | | Compare |
Alternate job titles: CTO | Top Technology Executive | Vice President of Technology |
Responsible for the long-range direction of an organization's technology function. Directs the strategic design, acquisition, management, and implementation of an enterprise-wide technology infrastructure. Monitors and analyzes... view job details |
|
|
|
|
Chief Operating Officer | | Compare |
Alternate job titles: COO |
Leads the planning and development of an organization's operational objectives and initiatives. Develops strategies and oversees the execution of plans to attain short- and long-term financial and mission-critical operational... view job details |
|
|
|
|
VP of Information Security | | Compare |
Alternate job titles: VP of Data Security | VP of Information Security Risk | VP of Information Systems Security | VP of InfoSec | VP of InfoSec Intrusion | VP of InfoSec/Access Control | VP of IS and Cyber Security | VP, Information Security |
Plans and leads all information security activities within an organization. Responsible for determining the organization's information security policies and strategies. Provides leadership and oversight to the development,... view job details |
|
|
|
|
Information Security Director | | Compare |
Alternate job titles: Data and Cyber Security Director | Data Security Director | Information Systems Security Director | Information Vulnerability/Risk Director | InfoSec Director | InfoSec Intrusion Investigation Director | InfoSec/Access Control Director | IS and Cyber Security Director |
Directs and leads the team responsible for ensuring the security of the organization's systems and information assets. Establishes and implements the overall strategies and procedures for the information security function.... view job details |
|
|
|
|
Information Security Manager | | Compare |
Alternate job titles: Data and Cyber Security Manager | Data Security Manager | Information Systems Security Manager | Information Vulnerability and Risk Mitigation Manager | InfoSec Intrusion Investigation Manager | InfoSec Manager | InfoSec/Access Control Manager | IS and Cyber Security Manager |
Manages the team responsible for ensuring the security of the organization's systems and information assets. Oversees the development and implementation of security systems, guidelines, and strategies. Implements processes and... view job details |
|
|
|
|
Chief Financial Officer | | Compare |
Alternate job titles: CFO | Chief Financial Executive | Top Financial Executive |
Responsible for developing an organization's overall financial policies. Provides strategic direction of all financial functions including accounting, budget, credit, insurance, tax, and treasury. Ensures that proper financial controls... view job details |
|
|
|
|
Information Security Analyst I | | Compare |
Alternate job titles: Data Security Analyst I | Information Security Specialist I | Information Systems Security Analyst I | Information Vulnerability/Risk Analyst I | InfoSec Analyst I | InfoSec Intrusion Investigation Analyst I | InfoSec/Access Control Analyst I | IS and Cyber Security Professional - Entry |
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption,... view job details |
|
|
|
|
Information Security Analyst II | | Compare |
Alternate job titles: Data Security Analyst II | Information Security Specialist II | Information Systems Security Analyst II | Information Vulnerability/Risk Analyst II | InfoSec Analyst II | InfoSec Intrusion Investigation Analyst II | InfoSec/Access Control Analyst II | IS and Cyber Security Professional - Intermediate |
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption,... view job details |
|
|
|
|
Information Security Analyst III | | Compare |
Alternate job titles: Data Security Analyst III | Information Security Specialist III | Information Systems Security Analyst III | Information Vulnerability/Risk Analyst III | InfoSec Analyst III | InfoSec Intrusion Investigation Analyst III | InfoSec/Access Control Analyst III | IS and Cyber Security Professional - Senior |
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption,... view job details |
|
|
|
|
Information Security Analyst IV | | Compare |
Alternate job titles: Data Security Analyst IV | Information Security Specialist IV | Information Systems Security Analyst IV | Information Vulnerability/Risk Analyst IV | InfoSec Analyst IV | InfoSec Intrusion Investigation Analyst IV | InfoSec/Access Control Analyst IV | IS and Cyber Security Professional - Senior Specialist |
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption,... view job details |
|
|
|
|
Information Security Analyst V | | Compare |
Alternate job titles: Data Security Analyst V | Information Security Specialist V | Information Systems Security Analyst V | Information Vulnerability/Risk Analyst V | InfoSec Analyst V | InfoSec Intrusion Investigation Analyst V | InfoSec/Access Control Analyst V | IS and Cyber Security Professional - Expert Team Lead |
Responsible for ensuring the security of the organization's systems and information assets. Develops and implements security systems, guidelines, and strategies. Protects against unauthorized access, use, disclosure, disruption,... view job details |
|
|
|
|
Information Security Senior Supervisor | | Compare |
Alternate job titles: Data and Cyber Security Senior Supervisor | Data Security Senior Supervisor | Information Systems Security Senior Supervisor | Information Vulnerability and Risk Mitigation Senior Supervisor | InfoSec Intrusion Investigation Senior Supervisor | InfoSec Senior Supervisor | InfoSec/Access Control Senior Supervisor | IS and Cyber Security Senior Supervisor |
Supervises the team responsible for ensuring the security of the organization's systems and information assets. Monitors the development and implementation of security systems, guidelines, and strategies. Protects against... view job details |
|
|
|
|
Information Security Senior Manager | | Compare |
Alternate job titles: Data and Cyber Security Senior Manager | Data Security Senior Manager | Information Systems Security Senior Manager | Information Vulnerability and Risk Mitigation Senior Manager | InfoSec Intrusion Investigation Senior Manager | InfoSec Senior Manager | InfoSec/Access Control Senior Manager | IS and Cyber Security Senior Manager |
Leads and manages the team responsible for ensuring the security of the organization's systems and information assets. Oversees the development and implementation of security systems, guidelines, and strategies. Implements... view job details |
|
|
|
|
Chief Human Resources Officer (CHRO) | | Compare |
Alternate job titles: Chief Human Resources Officer (CHRO) | Chief People Officer | CHRO | Global Human Resources Executive |
Provides the leadership, strategy, design, and execution of an organization's human resources philosophy, programs and initiatives. Designs and develops an end-to-end human resources function to deliver talent acquisition,... view job details |
|
|
|
|