How to protect your personal information from online hackers

Source: National Cyber Security – Produced By Gregory Evans A local computer expert said internet hackers are getting better at stealing personal information. Jim Hoatson, of Integrated Computer Systems in North Platte, said it doesn’t take a four-year college degree, or expert computer skills to steal someone’s personal information. ……

read more

Information Systems Security Officer

Source: National Cyber Security – Produced By Gregory Evans Job Description:   Responsible for supporting adherence to all aspects of the Information Assurance (IA) program as stipulated by various USG requirements including (but not limited to): NISPOM, JSIG, ICD 503 and associated NIST publications, and customer/contract specific IA The post…

read more

Information Security Risk Analyst

Source: National Cyber Security – Produced By Gregory Evans Join our team and experience Workday! It’s fun to work in a company where people truly believe in what they’re doing. At Workday, we’re committed to bringing passion and customer focus to the business of enterprise applications. We work hard, The…

read more

Intern: Information Security Analyst

Source: National Cyber Security – Produced By Gregory Evans The IT Cyber Security Operations Center analyst is a key contributor to the success of Juniper’s IT Security program and the protection of the company’s intellectual property and computing assets.   This position monitors a large-scale enterprise environment for The post Intern:…

read more

Lead Network Information Security Specialist

Source: National Cyber Security – Produced By Gregory Evans Responsibilities As a Security Consultant within Verizon’s Investigative Response Team, the candidate will be expected to serve a a tactical arm of the team, conducting computer forensic analysis, data recovery, eDiscovery, and other IT investigative work. Due to the inherent The…

read more

Information Security Analyst-C

Source: National Cyber Security – Produced By Gregory Evans Job Description The most security-conscious organizations trust Telos Corporation to protect their vital IT assets. The reputation of our company rests on the quality of our solution and the integrity of our people. Explore what you can bring to The post…

read more

Information Security Analyst

Source: National Cyber Security – Produced By Gregory Evans Category: Information Technology, Other Employee Type: Full-Time Location: US-NJ-Bernards Experience: Not Specified Job Description Information Security Analyst II Full-time (W2 only / no 1099/C2C payment terms or sponsorship) Basking Ridge, NJ The post Information Security Analyst appeared first on National Cyber…

read more

Information Technology Specialist

Source: National Cyber Security – Produced By Gregory Evans Who May Apply: Open to all qualified job seekers Date Posted: 10/03/2016 Closing Date: 10/17/2016 Hiring Agency/Seniority Unit: MN.IT Services Division/Unit: MN.IT @ Central Work Shift/Work Hours: Day Shift Days of Work: Monday – Friday Travel Required: No Salary Range: The…

read more

Director of Information Technology

Source: National Cyber Security – Produced By Gregory Evans Recruitment/Posting Title Director of Information Technology Job Category Information Technology Department SAS – Dean’s Office Overview Rutgers, The State University of New Jersey, is a leading national research university and The post Director of Information Technology appeared first on National Cyber…

read more

Chief Information Officer

Source: National Cyber Security – Produced By Gregory Evans Company Description VTS3 is a Veteran owned and operated company which provides custom software services and is a full service recruiting and search firm specializing in Information Technology, Software Development, Consulting and Business Services.  We work with both The post Chief…

read more