OrbitJobs
  • Home
  • Jobs
  • Post a Job
  • Pricing
    • Employer Products
  • Resume Search
  • Advertisers
    • Restaurant & Bar
    • Food & Wine
    • Health-Care, Medical-Clinic, Salon & Spa
    • Hotels & Resorts
    • Art & Entertainment
    • Auto
    • Education
    • Kitchen & Household
    • Recruiting & Talent Search
    • Communication & Information Technology
    • Real Estate
  • Charity Donation
  • News & Blogs
  • Sign in
  • Sign up
  • Home
  • Jobs
  • Post a Job
  • Pricing
    • Employer Products
  • Resume Search
  • Advertisers
    • Restaurant & Bar
    • Food & Wine
    • Health-Care, Medical-Clinic, Salon & Spa
    • Hotels & Resorts
    • Art & Entertainment
    • Auto
    • Education
    • Kitchen & Household
    • Recruiting & Talent Search
    • Communication & Information Technology
    • Real Estate
  • Charity Donation
  • News & Blogs

Modal title

24 jobs found in yakima

Refine Search
Executive Administrative Assistant
Quality Cleaning Yakima, WA, USA
Quality Cleaning Administrative Assistant Primary Duties Include General Office: Input accounting data into QuickBooks Generate new hire paperwork, worksheets, reports, etc. Answer telephones and correspond to emails Respond to client / potential client inquiries Check office supplies, stock and request needed supplies Maintain office equipment, and vehicles / maintenance records Store records using established filing systems Ensure filing systems are maintained and up-to-date Maintain and store keys / spare keys Communicate tickets, projects, and client feedback solutions to customers and management Prepare Excel, Word, and PowerPoint documents for general company programs or meetings Keep company licenses / insurance etc. up to date Managing Schedules/Calendars Networking: Attend networking and community events as needed Partner with Business Develop Manager to schedule events Represent the Values and Behaviors of Quality Cleaning while in the community Manage Facebook inquires, posts and promotions Invoicing / Banking Generate all invoices and send to clients in a timely manner Receive payments – and file in proper systems. Follow up on late payments Manage P.O. box and take deposits to the bank. Inventory Send inventory requests and communications to clients Maintain stock and par inventory levels in the offices Pick up supplies as needed at stores or vendor locations Track ordering and employee usage Personnel Management / Human Resources Fill out new hire paperwork Observe and manage hours and payroll reports for employees Manage group chat, cleaning applications Create, manage, and edit cleaning schedules for crews Communicate with business development manager and night supervisors as needed Manage calendars for leadership team Advertise job openings for new and current openings Coordinate interviews and employee screenings w/ background checks Organize and Process Disciplinary paperwork for associates Qualifications Education: High school diploma or equivalent Bachelors Degree (Preferred)  Accounting Certification (Preferred) General skills and abilities: QuickBooks Excel, Word, Power Point, Excellent interpersonal skills Team building skills Decision making skills Attention to detail and high level of accuracy Effective organizational skills Time management skills Ability to maintain a high level of accuracy in preparing and entering information Honest, trustworthy, and respectful Must demonstrate sound work ethics Working Conditions and Physical Requirements: Lifting of supplies and materials from time to time up to 50 pounds Capable of multiple hours at a desk entering financial information which requires attention to detail and high levels of accuracy Adaptability to new tasks that can arise on any given day Travel Requirements: 20% This Position requires one day per week working out of the Kennewick office.    Benefits:  Paid Vacation, Paid Holidays, Company Cell Phone / Laptop, Paid Personal Days Job Type: Full Time Salaried Experience: Administrative Assistant: 2 years (Required) Job Location: Yakima WA Language: Bilingual English & Spanish (Preferred)
Dec 07, 2019
Quality Cleaning Administrative Assistant Primary Duties Include General Office: Input accounting data into QuickBooks Generate new hire paperwork, worksheets, reports, etc. Answer telephones and correspond to emails Respond to client / potential client inquiries Check office supplies, stock and request needed supplies Maintain office equipment, and vehicles / maintenance records Store records using established filing systems Ensure filing systems are maintained and up-to-date Maintain and store keys / spare keys Communicate tickets, projects, and client feedback solutions to customers and management Prepare Excel, Word, and PowerPoint documents for general company programs or meetings Keep company licenses / insurance etc. up to date Managing Schedules/Calendars Networking: Attend networking and community events as needed Partner with Business Develop Manager to schedule events Represent the Values and Behaviors of Quality Cleaning while in the community Manage Facebook inquires, posts and promotions Invoicing / Banking Generate all invoices and send to clients in a timely manner Receive payments – and file in proper systems. Follow up on late payments Manage P.O. box and take deposits to the bank. Inventory Send inventory requests and communications to clients Maintain stock and par inventory levels in the offices Pick up supplies as needed at stores or vendor locations Track ordering and employee usage Personnel Management / Human Resources Fill out new hire paperwork Observe and manage hours and payroll reports for employees Manage group chat, cleaning applications Create, manage, and edit cleaning schedules for crews Communicate with business development manager and night supervisors as needed Manage calendars for leadership team Advertise job openings for new and current openings Coordinate interviews and employee screenings w/ background checks Organize and Process Disciplinary paperwork for associates Qualifications Education: High school diploma or equivalent Bachelors Degree (Preferred)  Accounting Certification (Preferred) General skills and abilities: QuickBooks Excel, Word, Power Point, Excellent interpersonal skills Team building skills Decision making skills Attention to detail and high level of accuracy Effective organizational skills Time management skills Ability to maintain a high level of accuracy in preparing and entering information Honest, trustworthy, and respectful Must demonstrate sound work ethics Working Conditions and Physical Requirements: Lifting of supplies and materials from time to time up to 50 pounds Capable of multiple hours at a desk entering financial information which requires attention to detail and high levels of accuracy Adaptability to new tasks that can arise on any given day Travel Requirements: 20% This Position requires one day per week working out of the Kennewick office.    Benefits:  Paid Vacation, Paid Holidays, Company Cell Phone / Laptop, Paid Personal Days Job Type: Full Time Salaried Experience: Administrative Assistant: 2 years (Required) Job Location: Yakima WA Language: Bilingual English & Spanish (Preferred)
Licensed Practical Nurse (LPN)
Aveanna Healthcare Yakima, WA, USA
Job Description ? Licensed Practical Nurse (LPN) *Now Offering Paid Time Off (PTO) Benefits* Aveanna Healthcare, the largest pediatric home health care company in the U.S., is hiring compassionate Licensed Practical Nurses (LPN) to provide skilled nursing care to patients in the home setting. We are the hearts of 30,000 caregivers and trusted by over 33,000 families. Qualifications of the Licensed Practical Nurse (LPN): * Must have good standing license (LPN) in the state in which the clinician will practice * Must have at least 6 months of hands on nursing experience * Current CPR certification * Must be willing to provide in home nursing care to infants, children, and adolescents Responsibilities of the Licensed Practical Nurse (LPN): * One to one patient care in a home environment * Execution of physicians prescribed plan of care and compliant documentation of care provided in system of record * Administration of prescribed medication, treatments and therapies * Patient assessments, coordination of care * Health promotion, teaching, and training of family members Benefits of the Licensed Practical Nurse (LPN): * Health and Life Insurance* * Paid Time Off Available * 401(k) Savings Plan with Employer Matching* * Easy access to state of the art technology for electronic charting during point of care * 24 Hour 7 Days a Week Team Support for direct clinical and scheduling assistance * Hourly Pay & Weekly Paychecks * Flexible Scheduling (8, 10, and 12 hour shifts; Day/Night/Weekends available) * Potential for Overtime * Paid Training & Continuous Professional Development *benefit eligibility is dependent on employment status by Jobble
Dec 07, 2019
Job Description ? Licensed Practical Nurse (LPN) *Now Offering Paid Time Off (PTO) Benefits* Aveanna Healthcare, the largest pediatric home health care company in the U.S., is hiring compassionate Licensed Practical Nurses (LPN) to provide skilled nursing care to patients in the home setting. We are the hearts of 30,000 caregivers and trusted by over 33,000 families. Qualifications of the Licensed Practical Nurse (LPN): * Must have good standing license (LPN) in the state in which the clinician will practice * Must have at least 6 months of hands on nursing experience * Current CPR certification * Must be willing to provide in home nursing care to infants, children, and adolescents Responsibilities of the Licensed Practical Nurse (LPN): * One to one patient care in a home environment * Execution of physicians prescribed plan of care and compliant documentation of care provided in system of record * Administration of prescribed medication, treatments and therapies * Patient assessments, coordination of care * Health promotion, teaching, and training of family members Benefits of the Licensed Practical Nurse (LPN): * Health and Life Insurance* * Paid Time Off Available * 401(k) Savings Plan with Employer Matching* * Easy access to state of the art technology for electronic charting during point of care * 24 Hour 7 Days a Week Team Support for direct clinical and scheduling assistance * Hourly Pay & Weekly Paychecks * Flexible Scheduling (8, 10, and 12 hour shifts; Day/Night/Weekends available) * Potential for Overtime * Paid Training & Continuous Professional Development *benefit eligibility is dependent on employment status by Jobble
Registered Nurse (RN)
Aveanna Healthcare Yakima, WA, USA
Job Description Registered Nurse (RN) *Now Offering Paid Time Off (PTO) Benefits* Aveanna Healthcare, the largest pediatric home health care company in the U.S., is hiring compassionate Registered Nurses (RN) to provide skilled nursing care to patients in the home setting. We are the hearts of 30,000 caregivers and trusted by over 33,000 families. Qualifications of the Registered Nurse (RN): * Must have good standing license (RN) in the state in which the clinician will practice * Must have at least 6 months of hands on nursing experience * Current CPR certification * Must be willing to provide in home nursing care to infants, children, and adolescents Responsibilities of the Registered Nurse (RN): * One to one patient care in a home environment * Execution of physicians prescribed plan of care and compliant documentation of care provided in system of record * Administration of prescribed medication, treatments and therapies * Patient assessments, coordination of care * Health, promotion, teaching, and training of family members Benefits of the Registered Nurse (RN): * Health and Life Insurance* * Paid Time Off Available * 401(k) Savings Plan with Employer Matching* * Easy access to state of the art technology for electronic charting during point of care * 24 Hour 7 Days a Week Team Support for direct clinical and scheduling assistance * Hourly Pay & Weekly Paychecks * Flexible Scheduling (8, 10, and 12 hour shifts; Day/Night/Weekends available) * Potential for Overtime * Paid Training & Continuous Professional Development *benefit eligibility is dependent on employment status by Jobble
Dec 07, 2019
Job Description Registered Nurse (RN) *Now Offering Paid Time Off (PTO) Benefits* Aveanna Healthcare, the largest pediatric home health care company in the U.S., is hiring compassionate Registered Nurses (RN) to provide skilled nursing care to patients in the home setting. We are the hearts of 30,000 caregivers and trusted by over 33,000 families. Qualifications of the Registered Nurse (RN): * Must have good standing license (RN) in the state in which the clinician will practice * Must have at least 6 months of hands on nursing experience * Current CPR certification * Must be willing to provide in home nursing care to infants, children, and adolescents Responsibilities of the Registered Nurse (RN): * One to one patient care in a home environment * Execution of physicians prescribed plan of care and compliant documentation of care provided in system of record * Administration of prescribed medication, treatments and therapies * Patient assessments, coordination of care * Health, promotion, teaching, and training of family members Benefits of the Registered Nurse (RN): * Health and Life Insurance* * Paid Time Off Available * 401(k) Savings Plan with Employer Matching* * Easy access to state of the art technology for electronic charting during point of care * 24 Hour 7 Days a Week Team Support for direct clinical and scheduling assistance * Hourly Pay & Weekly Paychecks * Flexible Scheduling (8, 10, and 12 hour shifts; Day/Night/Weekends available) * Potential for Overtime * Paid Training & Continuous Professional Development *benefit eligibility is dependent on employment status by Jobble
Pediatric Intensive Care - PICU RN - Travel (Yakima)
HealthCare Traveler Jobs Yakima, WA, USA
Registered Nurse. Travel Nurse Associated topics: ambulatory, bsn, ccu, maternal, nurse, nurse clinical, psychatric, psychiatric, staff nurse, surgical
Dec 07, 2019
Registered Nurse. Travel Nurse Associated topics: ambulatory, bsn, ccu, maternal, nurse, nurse clinical, psychatric, psychiatric, staff nurse, surgical
Pediatric Intensive Care - PICU RN - Travel (Yakima)
HealthCare Traveler Jobs Yakima, WA, USA
Registered Nurse. Travel Nurse Associated topics: ambulatory, bsn, ccu, maternal, nurse, nurse clinical, psychatric, psychiatric, staff nurse, surgical
Dec 07, 2019
Registered Nurse. Travel Nurse Associated topics: ambulatory, bsn, ccu, maternal, nurse, nurse clinical, psychatric, psychiatric, staff nurse, surgical
Mother/Baby - Postpartum RN - Travel - in Washington (Yakima)
HealthCare Traveler Jobs Yakima, WA, USA
Registered Nurse. Travel Nurse Associated topics: ambulatory, asn, cardiothoracic, care unit, ccu, coronary, intensive, mhb, neonatal, surgery
Dec 07, 2019
Registered Nurse. Travel Nurse Associated topics: ambulatory, asn, cardiothoracic, care unit, ccu, coronary, intensive, mhb, neonatal, surgery
Mother/Baby - Postpartum RN - Travel - in Washington (Yakima)
HealthCare Traveler Jobs Yakima, WA, USA
Registered Nurse. Travel Nurse Associated topics: ambulatory, asn, cardiothoracic, care unit, ccu, coronary, intensive, mhb, neonatal, surgery
Dec 07, 2019
Registered Nurse. Travel Nurse Associated topics: ambulatory, asn, cardiothoracic, care unit, ccu, coronary, intensive, mhb, neonatal, surgery
Travel Registered Nurse RN Operating Room OR - Burien
One Staff Medical Yakima, WA, USA
Job Description: Travel Registered Nurse RN Operating Room OR burien, WA 06:45 am to 03:15 pm Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Operating Room OR to join our family, and well, thats you! So check this out The Operating Room (OR) Nurse will provide care for patients before, during and after surgery. They will also, educate the patient, circulating nurse and/or scrub nurse, and potentially RN first assistant or operating room director. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Operating Room OR Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS, ACLS & possibly others Associated topics: care unit, coronary, intensive, neonatal, nurse clinical, psychiatric, staff nurse, surgical, transitional, unit
Dec 07, 2019
Job Description: Travel Registered Nurse RN Operating Room OR burien, WA 06:45 am to 03:15 pm Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Operating Room OR to join our family, and well, thats you! So check this out The Operating Room (OR) Nurse will provide care for patients before, during and after surgery. They will also, educate the patient, circulating nurse and/or scrub nurse, and potentially RN first assistant or operating room director. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Operating Room OR Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS, ACLS & possibly others Associated topics: care unit, coronary, intensive, neonatal, nurse clinical, psychiatric, staff nurse, surgical, transitional, unit
Registered Nurse - RN - Travel Contract
Accountable Healthcare Staffing Yakima, WA, USA
*** Text "Accountable" to 86754 to get started ***Travel Nurses - RN - Immediate and Future 13 Week Travel Contracts.Specialties: Emergency Department Trauma - ED / ER, Intensive Care Unit - ICU, Labor & Delivery - L&D, Medical/Surgical - M/S, Operating Room - OR, and Telemetry -TeleAdventure Awaits! Voted BEST PLACES TO WORK Modern Healthcare Accountable is leading the way in Travel Nursing - Run by Nurses for Nurses, we Care for the Caregiver. See why Thousands of Nurses are making the move!Ever heard of the Modern Day Gypsy?Want the freedom and pay of travel but enjoy the stability of perm? Tired of negotiating your salary and location every 3 months?Accountable is now offering numerous 26-39 week and even annual contracts with options to renew for longer at many of our partner facilities. Be the Gypsy that wants to know their next contact is guaranteed.Feel more connected on your travel assignment and make lasting friendships while gaining professional growth, stability and flexibility. Be part of a dynamic team while continuing to build greatness and provide healing and compassion to patients and family.We offer the highest quality perks in the healthcare staffing industry for all our Travel options:Higher pay than the industry averageKnowledgeable Recruiter that have YOUR interests in mind$800.00 RN Contract Referral Bonus Cha-Ching!Medical, Dental and Vision coverage beginning Day 1 of your contract for you and your familyShort Term DisabilityLife and Pet insuranceExtension and completion bonuses on many of our assignmentsFINALLY an agency that Cares of the CaregiverEEO/Minority/Female/Individuals with Disabilities/Sexual Orientation/Gender Identity/Veteran Associated topics: ccu, hospice, maternal, nurse clinical, nurse rn, psychatric, psychiatric, recovery, registered nurse, surgical
Dec 06, 2019
*** Text "Accountable" to 86754 to get started ***Travel Nurses - RN - Immediate and Future 13 Week Travel Contracts.Specialties: Emergency Department Trauma - ED / ER, Intensive Care Unit - ICU, Labor & Delivery - L&D, Medical/Surgical - M/S, Operating Room - OR, and Telemetry -TeleAdventure Awaits! Voted BEST PLACES TO WORK Modern Healthcare Accountable is leading the way in Travel Nursing - Run by Nurses for Nurses, we Care for the Caregiver. See why Thousands of Nurses are making the move!Ever heard of the Modern Day Gypsy?Want the freedom and pay of travel but enjoy the stability of perm? Tired of negotiating your salary and location every 3 months?Accountable is now offering numerous 26-39 week and even annual contracts with options to renew for longer at many of our partner facilities. Be the Gypsy that wants to know their next contact is guaranteed.Feel more connected on your travel assignment and make lasting friendships while gaining professional growth, stability and flexibility. Be part of a dynamic team while continuing to build greatness and provide healing and compassion to patients and family.We offer the highest quality perks in the healthcare staffing industry for all our Travel options:Higher pay than the industry averageKnowledgeable Recruiter that have YOUR interests in mind$800.00 RN Contract Referral Bonus Cha-Ching!Medical, Dental and Vision coverage beginning Day 1 of your contract for you and your familyShort Term DisabilityLife and Pet insuranceExtension and completion bonuses on many of our assignmentsFINALLY an agency that Cares of the CaregiverEEO/Minority/Female/Individuals with Disabilities/Sexual Orientation/Gender Identity/Veteran Associated topics: ccu, hospice, maternal, nurse clinical, nurse rn, psychatric, psychiatric, recovery, registered nurse, surgical
Travel Registered Nurse RN Labor and Delivery - Tacoma
One Staff Medical Yakima, WA, USA
Job Description: Travel Registered Nurse RN Labor and Delivery tacoma, WA 07:00 pm to 07:30 am Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Labor and Delivery to join our family, and well, thats you! So check this out Labor and Delivery Nurses help bring people into the world every day. They care for women during labor and childbirth, monitoring the baby and the mother, coaching mothers and assisting doctors. As a Labor and Delivery Nurse, youll prepare women, and their families, for the stages of giving birth and help patients with breastfeeding after the baby is born. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Labor and Delivery Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS, NRP, INT, ADV AWHONN, ACLS, STABLE, PALS & possibly others Associated topics: care unit, ccu, coronary, hospice, intensive, maternal, psychatric, psychiatric, recovery, unit
Dec 05, 2019
Job Description: Travel Registered Nurse RN Labor and Delivery tacoma, WA 07:00 pm to 07:30 am Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Labor and Delivery to join our family, and well, thats you! So check this out Labor and Delivery Nurses help bring people into the world every day. They care for women during labor and childbirth, monitoring the baby and the mother, coaching mothers and assisting doctors. As a Labor and Delivery Nurse, youll prepare women, and their families, for the stages of giving birth and help patients with breastfeeding after the baby is born. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Labor and Delivery Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS, NRP, INT, ADV AWHONN, ACLS, STABLE, PALS & possibly others Associated topics: care unit, ccu, coronary, hospice, intensive, maternal, psychatric, psychiatric, recovery, unit
Travel Registered Nurse RN Medical Surgical - Puyallup
One Staff Medical Yakima, WA, USA
Job Description: Travel Registered Nurse RN Medical Surgical puyallup, WA 12h nights Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Medical Surgical to join our family, and well, thats you! So check this out Medical-Surgical nurses provide direct care to adult patients in a variety of settings and is the largest group of nurses. They provide care for patients often with multiple diagnoses, across multiple medical specialties. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Medical Surgical Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS & possibly others Associated topics: ambulatory, asn, ccu, hospice, intensive, intensive care unit, neonatal, registered nurse, transitional, unit
Dec 05, 2019
Job Description: Travel Registered Nurse RN Medical Surgical puyallup, WA 12h nights Job Description We. Are. OneStaff. Medical. An independently-owned, nationally-recognized and amazingly awesome staffing firm ready to work for you! A work ethic forged in the Midwest, were here to stand by your side and help you find your dream assignment anywhere in this great country. We want the same like-minded, awesome candidates to travel with us. Be bold. Enjoy work again. Let us help. Now back to what youre here for; were looking for a Travel Registered Nurse RN Medical Surgical to join our family, and well, thats you! So check this out Medical-Surgical nurses provide direct care to adult patients in a variety of settings and is the largest group of nurses. They provide care for patients often with multiple diagnoses, across multiple medical specialties. Experience Requirements: Minimum 1 year of current work experience in Travel Registered Nurse RN Medical Surgical Washington state Healthcare Provider license or willing to obtain This position may require one or more of these certifications: BLS & possibly others Associated topics: ambulatory, asn, ccu, hospice, intensive, intensive care unit, neonatal, registered nurse, transitional, unit
Technology Analyst (Yakima)
ITL USA Yakima, WA, USA
Description In the role of Technology Analyst , you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application Architecture definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued. Location for this position is Redmond, WA . This position may require relocation or 100% travel U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications: Basic: Bachelors degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. At least 2 years of experience in Information Technology. Preferred: At least 2 years of hands on experience in Big Data and/or Analytics, and all phases of SDLC Experience in U-SQL, PowerShell, ADF required. Atleast 1years of hands on experience in Azure SQL, ADL, ADF, Azure analysis services needed. Experience in CI/CD is needed. At least 1End to end implementation experience required. Hands on experience in specifications, technical design, and development Should have ability to troubleshoot performance issues, identify root cause and apply fixes. Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates The job entails sitting as well as working at a computer for extended periods. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: equipment, maintain, maintenance, network, satellite, server, system engineer, system specialist, system technician, technician
Dec 04, 2019
Description In the role of Technology Analyst , you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application Architecture definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued. Location for this position is Redmond, WA . This position may require relocation or 100% travel U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications: Basic: Bachelors degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. At least 2 years of experience in Information Technology. Preferred: At least 2 years of hands on experience in Big Data and/or Analytics, and all phases of SDLC Experience in U-SQL, PowerShell, ADF required. Atleast 1years of hands on experience in Azure SQL, ADL, ADF, Azure analysis services needed. Experience in CI/CD is needed. At least 1End to end implementation experience required. Hands on experience in specifications, technical design, and development Should have ability to troubleshoot performance issues, identify root cause and apply fixes. Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates The job entails sitting as well as working at a computer for extended periods. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: equipment, maintain, maintenance, network, satellite, server, system engineer, system specialist, system technician, technician
Technology Analyst (Yakima)
ITL USA Yakima, WA, USA
Description In the role of Technology Analyst , you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application Architecture definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued. Location for this position is Redmond, WA . This position may require relocation or 100% travel U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications: Basic: Bachelors degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. At least 2 years of experience in Information Technology. Preferred: At least 2 years of hands on experience in Big Data and/or Analytics, and all phases of SDLC Experience in U-SQL, PowerShell, ADF required. Atleast 1years of hands on experience in Azure SQL, ADL, ADF, Azure analysis services needed. Experience in CI/CD is needed. At least 1End to end implementation experience required. Hands on experience in specifications, technical design, and development Should have ability to troubleshoot performance issues, identify root cause and apply fixes. Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates The job entails sitting as well as working at a computer for extended periods. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: equipment, maintain, maintenance, network, satellite, server, system engineer, system specialist, system technician, technician
Dec 04, 2019
Description In the role of Technology Analyst , you will interface with key stakeholders and apply your technical proficiency across different stages of the Software Development Life Cycle including Requirements Elicitation, Application Architecture definition and Design. You will play an important role in creating the high-level design artifacts. You will also deliver high quality code deliverables for a module, lead validation for all types of testing and support activities related to implementation, transition and warranty. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued. Location for this position is Redmond, WA . This position may require relocation or 100% travel U.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications: Basic: Bachelors degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. At least 2 years of experience in Information Technology. Preferred: At least 2 years of hands on experience in Big Data and/or Analytics, and all phases of SDLC Experience in U-SQL, PowerShell, ADF required. Atleast 1years of hands on experience in Azure SQL, ADL, ADF, Azure analysis services needed. Experience in CI/CD is needed. At least 1End to end implementation experience required. Hands on experience in specifications, technical design, and development Should have ability to troubleshoot performance issues, identify root cause and apply fixes. Experience in working in Agile teams, and working independently with Business stakeholders providing solutions and regular updates The job entails sitting as well as working at a computer for extended periods. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: equipment, maintain, maintenance, network, satellite, server, system engineer, system specialist, system technician, technician
Program Lead, Cybersecurity Purple Team (Yakima)
Washington Metropolitan Area Transit Authority Yakima, WA, USA
Department Marketing Statement The Washington Metropolitan Area Transit Authority (Metro) is building a state-of-the-art cybersecurity program to better protect the critical transit infrastructure supporting our nation's capital. The Program Lead, Cybersecurity Purple Team will perform a wide range of Purple Team (offensive and defensive) testing including network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, social-engineering testing, and IDS/IPS/HIDS/HIPS evasion techniques. The Lead shall develop comprehensive and accurate reports and presentations for both technical and executive audiences. The Lead shall effectively communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel. The Lead provides risk-appropriate and pragmatic recommendations to correct vulnerabilities found, configures and safely utilizes attacker tools, tactics, and procedures for IT, OT, SCADA and sensitive environments; develops scripts, tools, or methodologies to enhance the purple teaming processes; provides guidance to advance the defensive capabilities of the team and its subsequent ability to defend against eminent threats and assess the Cyber readiness and awareness through scenario based controlled incidents. The Lead shall partner with threat intelligence, monitoring, analytics and incident response personnel as a part of a holistic fusion program. Minimum Qualifications Education A Bachelor's degree from an accredited college or university Experience Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted Preferred Education A Bachelor's Degree in Computer Science, Cybersecurity or a related technical field Medical Group Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations. Summary The Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats. Essential Functions Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated. Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated. Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats. Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture. Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program. Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs). Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats. Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel's Office) and external (e.g., law enforcement agencies, vendors, public relations professionals). Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated. Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices. Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices. Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat. Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision. Evaluation Criteria Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience. Evaluation criteria may include one or more of the following: Personal Interview Skills Assessments Verification of education and experience Criminal Background Check ..... click apply for full job details Associated topics: cybersecurity, identity access management, iam, idm, information security, information technology security, security, security analyst, security officer, vulnerability
Dec 04, 2019
Department Marketing Statement The Washington Metropolitan Area Transit Authority (Metro) is building a state-of-the-art cybersecurity program to better protect the critical transit infrastructure supporting our nation's capital. The Program Lead, Cybersecurity Purple Team will perform a wide range of Purple Team (offensive and defensive) testing including network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, social-engineering testing, and IDS/IPS/HIDS/HIPS evasion techniques. The Lead shall develop comprehensive and accurate reports and presentations for both technical and executive audiences. The Lead shall effectively communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel. The Lead provides risk-appropriate and pragmatic recommendations to correct vulnerabilities found, configures and safely utilizes attacker tools, tactics, and procedures for IT, OT, SCADA and sensitive environments; develops scripts, tools, or methodologies to enhance the purple teaming processes; provides guidance to advance the defensive capabilities of the team and its subsequent ability to defend against eminent threats and assess the Cyber readiness and awareness through scenario based controlled incidents. The Lead shall partner with threat intelligence, monitoring, analytics and incident response personnel as a part of a holistic fusion program. Minimum Qualifications Education A Bachelor's degree from an accredited college or university Experience Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted Preferred Education A Bachelor's Degree in Computer Science, Cybersecurity or a related technical field Medical Group Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations. Summary The Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats. Essential Functions Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated. Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated. Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats. Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture. Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program. Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs). Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats. Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel's Office) and external (e.g., law enforcement agencies, vendors, public relations professionals). Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated. Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices. Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices. Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat. Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision. Evaluation Criteria Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience. Evaluation criteria may include one or more of the following: Personal Interview Skills Assessments Verification of education and experience Criminal Background Check ..... click apply for full job details Associated topics: cybersecurity, identity access management, iam, idm, information security, information technology security, security, security analyst, security officer, vulnerability
Program Lead, Cybersecurity Purple Team (Yakima)
Washington Metropolitan Area Transit Authority Yakima, WA, USA
Department Marketing Statement The Washington Metropolitan Area Transit Authority (Metro) is building a state-of-the-art cybersecurity program to better protect the critical transit infrastructure supporting our nation's capital. The Program Lead, Cybersecurity Purple Team will perform a wide range of Purple Team (offensive and defensive) testing including network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, social-engineering testing, and IDS/IPS/HIDS/HIPS evasion techniques. The Lead shall develop comprehensive and accurate reports and presentations for both technical and executive audiences. The Lead shall effectively communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel. The Lead provides risk-appropriate and pragmatic recommendations to correct vulnerabilities found, configures and safely utilizes attacker tools, tactics, and procedures for IT, OT, SCADA and sensitive environments; develops scripts, tools, or methodologies to enhance the purple teaming processes; provides guidance to advance the defensive capabilities of the team and its subsequent ability to defend against eminent threats and assess the Cyber readiness and awareness through scenario based controlled incidents. The Lead shall partner with threat intelligence, monitoring, analytics and incident response personnel as a part of a holistic fusion program. Minimum Qualifications Education A Bachelor's degree from an accredited college or university Experience Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted Preferred Education A Bachelor's Degree in Computer Science, Cybersecurity or a related technical field Medical Group Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations. Summary The Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats. Essential Functions Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated. Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated. Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats. Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture. Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program. Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs). Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats. Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel's Office) and external (e.g., law enforcement agencies, vendors, public relations professionals). Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated. Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices. Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices. Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat. Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision. Evaluation Criteria Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience. Evaluation criteria may include one or more of the following: Personal Interview Skills Assessments Verification of education and experience Criminal Background Check ..... click apply for full job details Associated topics: cybersecurity, identity access management, iam, idm, information security, information technology security, security, security analyst, security officer, vulnerability
Dec 04, 2019
Department Marketing Statement The Washington Metropolitan Area Transit Authority (Metro) is building a state-of-the-art cybersecurity program to better protect the critical transit infrastructure supporting our nation's capital. The Program Lead, Cybersecurity Purple Team will perform a wide range of Purple Team (offensive and defensive) testing including network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network assessments, social-engineering testing, and IDS/IPS/HIDS/HIPS evasion techniques. The Lead shall develop comprehensive and accurate reports and presentations for both technical and executive audiences. The Lead shall effectively communicate findings and strategy to client stakeholders including technical staff, executive leadership, and legal counsel. The Lead provides risk-appropriate and pragmatic recommendations to correct vulnerabilities found, configures and safely utilizes attacker tools, tactics, and procedures for IT, OT, SCADA and sensitive environments; develops scripts, tools, or methodologies to enhance the purple teaming processes; provides guidance to advance the defensive capabilities of the team and its subsequent ability to defend against eminent threats and assess the Cyber readiness and awareness through scenario based controlled incidents. The Lead shall partner with threat intelligence, monitoring, analytics and incident response personnel as a part of a holistic fusion program. Minimum Qualifications Education A Bachelor's degree from an accredited college or university Experience Six (6) years of experience as a cybersecurity officer/engineer, information systems security officer, or specialized expertise in cyber policy, intelligence, analytics, budget, audit, metrics, or training such that it meets the specific role posted Preferred Education A Bachelor's Degree in Computer Science, Cybersecurity or a related technical field Medical Group Satisfactorily complete the medical examination for this position, if required. The incumbent must be able to perform the essential functions of this position either with or without reasonable accommodations. Summary The Cybersecurity Analyst - Lead is responsible for identifying and remediating security threats. The analyst designs defensive measures and monitors information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems and networks from threats. Essential Functions Supporting the director, oversees the data analytics strategy based on the National Institute of Standards and Technology (NIST) Cybersecurity Framework. This includes analyzing threat information from multiple sources, disciplines, and agencies across the Intelligence Community; Synthesizing and placing intelligence information in context; draws insights about the possible implications. Ensures threats and vulnerabilities are identified as early as possible and mitigated. Oversees the development of cyber threat indicators, attacks and compromise monitoring and maintains awareness of the status of the highly dynamic operating environment. Coordinates the collection, processes, analysis, and dissemination of cyber threat and warning assessments. Ensures vulnerabilities are identified as early as possible and mitigated. Oversees the intelligence of data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs) to analyze events that occur within the WMATA's environments (on-premises and cloud) for the purposes of mitigating threats. Oversees the development of performance and effectiveness assessment plans and measures. Conducts strategic and operational effectiveness assessments as required for cyber events. Determines whether systems performed as expected and provides input to the determination of operational effectiveness. Ensures that systems and networks are developed and deployed securely, leveraging best industry standards and a thorough understanding of both security and enterprise architecture. Supporting the director, oversees the production of assimilation of data and information from analytics and intelligence to support the creation of dashboards which inform senior leaders regarding the security posture of the organization. Generates routine and ad hoc urgent reports and action plans to support enhanced security procedures and response measures to ongoing or imminent threats. Ensures that WMATA has a properly managed and reportable cyber threat intelligence awareness program. Oversees the analysis of defensive and simulated offensive results, techniques used, and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from threats. Oversees the response to routine and urgent cybersecurity situations within the pertinent domain to mitigate immediate and potential cyber threats. Uses mitigation, preparedness, and response and recovery approaches, to maximize safety, preservation of property, and information security. Investigates and analyzes all relevant incident response activities. Ensures real-time cyber defense incident handling tasks are executed (e.g., forensic collections, intrusion correlation and tracking, threat analysis, and direct system remediation) to support deployable Incident Response Teams (IRTs). Oversees the incident response support functions through technical activities that gather evidence on criminal or foreign intelligence entities to mitigate possible or real-time threats, protect against insider threats, sabotage, international terrorist activities, and to support other intelligence activities. Investigates, analyzes, and responds to cyber incidents within the network environment or enclave. Ensures that the organization responds to attacks quickly and eliminate threats. Oversees the consultation for the support program to establish relationships, between the incident response team and other groups, both internal (e.g., General Counsel's Office) and external (e.g., law enforcement agencies, vendors, public relations professionals). Oversees the process that applies tactics, techniques, and procedures for a full range of investigative tools and processes to include, but not limited to, interviews, cyber surveillance, counter surveillance, and surveillance detection, and appropriately balances the benefits of intelligence gathering. Ensures that vulnerabilities are identified as early as possible and mitigated. Provides program oversight of activities to produce timely, fused, all-source cyber operations intelligence and/or indications and warnings intelligence products (e.g., threat assessments, briefings, intelligence studies, country studies). Analyzes collected information to identify vulnerabilities and potential for exploitation. Ensures that the reporting of all cyber events/activity are presented in a timely and actionable media; consistent with cyber intelligence and security best practices. Oversees detailed intelligence plans to satisfy cyber operations requirements. Collaborates with cyber operations planners to identify, validate and impose requirements for collection and analysis. Participates in targeting selection, validation, synchronization, and execution of cyber actions. Synchronizes intelligence activities to support organization objectives in cyberspace. Ensures the reporting of all cyber events/activity are presented in a timely and actionable media; relevant to cyber intelligence and security best practices. Oversees the monitoring of all defensive measures and information collected from a variety of sources to identify, analyze, and report events that occur or might occur within the network to protect information, information systems, and networks from internal and external threats. Takes appropriate action by reporting, remediating and/or providing preventive recommendations. Acts as the liaison between the security engineering and authorizing official. Ensures that analysis of the information (data) from various sources within the enterprise is executed and identifies possible security violation or threat. Oversees the process and analysis that identifies, collects, examines, and preserves evidence using controlled and documented analytical and investigative techniques. Manages the analysis of digital evidence and investigates computer security incidents to derive useful information in support of system/network vulnerability mitigation. Ensures the forensically sound collection of images and inspects to discern possible mitigation/remediation on enterprise systems. The essential duties listed are not intended to limit specific duties and responsibilities of any particular position. Nor is it intended to limit in any way the right of managers and supervisors to assign, direct and control the work of employees under their supervision. Evaluation Criteria Consideration will be given to applicants whose resumes demonstrate the required education and experience. Applicants should include all relevant education and work experience. Evaluation criteria may include one or more of the following: Personal Interview Skills Assessments Verification of education and experience Criminal Background Check ..... click apply for full job details Associated topics: cybersecurity, identity access management, iam, idm, information security, information technology security, security, security analyst, security officer, vulnerability
Test Analyst - US
Infosys Yakima, WA, USA
Role Test Analyst - US Auto req ID 48616BR Domain Independent Verification and Validation Testing Skillset Process|Testing processes|Mobile Test Automation process Country USA State / Region / Province Washington Work Location Bellevue, WA Company ITL USA Job Description Infosys - IVS SOA - Test Analyst - SOA+ Automation Testing, Bellevue, WA Infosys is a global leader in next-generation digital services and consulting. We navigate our clients' digital transformations in 45 countries across the world. We do it by enabling enterprises with an AI-powered core that helps prioritize the execution of change. We also empower businesses with agile digital at scale to deliver unprecedented levels of performance and customer delight. Our always-on learning agenda drives their continuous improvement through building and transferring digital skills, expertise, and ideas from our innovation ecosystem. Wanted: Global navigators, to guide the world's largest enterprises' digital transformations In the role of Test Analyst, you will act as a validation and quality assurance professional across the different stages of the Testing lifecycle: you will develop, design and deploy test scripts and cases of complex modules, help set up the test environment and contribute to the requirements documentation and test design for different types of testing. You will have the opportunity to collaborate with some of the best talent in the industry to create innovative high quality and defect-free solutions to meet our clients' business needs. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued Location for this position is Bellevue, Washington. This position may require 5% travelU.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications Basic - Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. - At least 2 years of experience with IT Preferred - Testing Service / Type: Test Automation - Job Roles / Responsibilities: Onshore Coordination, Test scripts development and execution, Prod Support, CI-CD support, On-call Prod Support. - Technical Skillset / Competency details: Java, Selenium, Appium, BDD, Jenkins Nice to have - Able to develop test automation scripts, execute on mobile devices - Familiarity with unit, integration and end-to-end testing - Functional knowledge and experience in testing software. Should have good communication, analytical ability and coordination skills - Experience in Software Testing Life Cycle - Defect logging and reporting - Experience and desire to work in a Global delivery environment The job entails sitting as well as working at a computer for extended periods of time. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: automation, prevent, quality, quality assurance, quality assurance analyst, quality assurance engineer, software quality, software quality assurance, software quality engineer, software quality assurance engineer
Dec 04, 2019
Role Test Analyst - US Auto req ID 48616BR Domain Independent Verification and Validation Testing Skillset Process|Testing processes|Mobile Test Automation process Country USA State / Region / Province Washington Work Location Bellevue, WA Company ITL USA Job Description Infosys - IVS SOA - Test Analyst - SOA+ Automation Testing, Bellevue, WA Infosys is a global leader in next-generation digital services and consulting. We navigate our clients' digital transformations in 45 countries across the world. We do it by enabling enterprises with an AI-powered core that helps prioritize the execution of change. We also empower businesses with agile digital at scale to deliver unprecedented levels of performance and customer delight. Our always-on learning agenda drives their continuous improvement through building and transferring digital skills, expertise, and ideas from our innovation ecosystem. Wanted: Global navigators, to guide the world's largest enterprises' digital transformations In the role of Test Analyst, you will act as a validation and quality assurance professional across the different stages of the Testing lifecycle: you will develop, design and deploy test scripts and cases of complex modules, help set up the test environment and contribute to the requirements documentation and test design for different types of testing. You will have the opportunity to collaborate with some of the best talent in the industry to create innovative high quality and defect-free solutions to meet our clients' business needs. You will be part of a learning culture, where teamwork and collaboration are encouraged, excellence is rewarded, and diversity is respected and valued Location for this position is Bellevue, Washington. This position may require 5% travelU.S. citizens and those authorized to work in the U.S. are encouraged to apply. We are unable to sponsor at this time. Qualifications Basic - Bachelor's degree or foreign equivalent required from an accredited institution. Will also consider three years of progressive experience in the specialty in lieu of every year of education. - At least 2 years of experience with IT Preferred - Testing Service / Type: Test Automation - Job Roles / Responsibilities: Onshore Coordination, Test scripts development and execution, Prod Support, CI-CD support, On-call Prod Support. - Technical Skillset / Competency details: Java, Selenium, Appium, BDD, Jenkins Nice to have - Able to develop test automation scripts, execute on mobile devices - Familiarity with unit, integration and end-to-end testing - Functional knowledge and experience in testing software. Should have good communication, analytical ability and coordination skills - Experience in Software Testing Life Cycle - Defect logging and reporting - Experience and desire to work in a Global delivery environment The job entails sitting as well as working at a computer for extended periods of time. Should be able to communicate by telephone, email or face to face. Travel may be required as per the job requirements. About Us Infosys is a global leader in consulting, technology and outsourcing solutions. We enable clients, in more than 30 countries, to stay a step ahead of emerging business trends and outperform the competition. We help them transform and thrive in a changing world by co-creating breakthrough solutions that combine strategic insights and execution excellence. EOE/Minority/Female/Veteran/Disabled/Sexual Orientation/Gender Identity/National Origin Associated topics: automation, prevent, quality, quality assurance, quality assurance analyst, quality assurance engineer, software quality, software quality assurance, software quality engineer, software quality assurance engineer
Chief Information Security Officer (Yakima)
Pitney Bowes Yakima, WA, USA
What if your search didn t reveal your ideal job? Don t worry. Sign up now to get updates on our latest opportunities. And please, check back often to search again, as new positions are posted regularly. At Pitney Bowes, we do the right thing, the right way. As a Chief Information Security Officer for Pitney Bowes, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. You are: A Self-motivated Leader who can architect and steer consolidation and planning applications for the enterprise. You are a Loyal individual who will partner with the functional leaders to align business needs with IT solutions to create value. You will: Information Technology and Business Leadership Responsible for the strategic leadership of the company s information security program. Provide guidance and counsel to the VP, IT Infrastructure, the CIO and key members of the company s leadership team, working closely with senior business, technology leaders, and the employees in defining objectives for information security, while building relationships and goodwill. Work with business leadership to oversee the operations of a company-wide information security organization organized toward a common goal in information security. Promote collaborative, empowered working environments across locations, removing barriers and realizing possibilities. Manage company-wide information security governance processes, chair the Information Security Advisory Committee driving information security program and project priorities. Lead the information security planning processes to establish an inclusive and comprehensive information security program for the entire business in support of business, engineering and information systems. Establish security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements. Stay abreast of information security issues and regulatory changes affecting all aspects of our business and communicate to the company on a regular basis about those topics. Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position. Mentor and implement professional development plans for the Information Security team members. Represent the corporation on committees and boards in national and regional consortiums and collaborations Your background: As a Chief Information Security Officer, you have: Policy, Compliance and Audit Led the development and implementation of effective policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation. Led efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the company s information and technology systems. Work with internal audit, external auditors, clients, prospective clients and outside consultants on required security assessments and audits. Coordinate and track all information technology and security related audits including scope of audits, departments involved, timelines, auditing agencies and outcomes. Work with auditors as appropriate to keep audit focus in scope, maintain excellent relationships with audit entities and provide a consistent perspective that continually puts the company in its best light. Provide guidance, evaluation and advocacy on audit responses. Work with technology, business and compliance leadership to build cohesive security and compliance programs for the corporation effectively addressing state and federal statutory and regulatory requirements. Develop a strategy for dealing with increasing number of audits, compliance checks and external assessment processes for internal/external auditors, PCI, SOX, HIPAA, and FISMA. Outreach, Education and Training Work closely with IT leaders, technical experts and business leaders across the company on a wide variety of security issues that require an in-depth understanding of the technology supporting their operations, as well as the engineering landscape. Create education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilities. Work with various groups in Information Technology, Business and Engineering to build awareness and a sense of common purpose around security. Pursue employee security initiatives to address unique needs in protecting identity theft, mobile social media security and online reputation program. Risk Management and Incident Response Keep abreast of security incidents and act as primary control point during significant information security incidents. Convene a Security Incident Response Team (SIRT) as needed, or requested, in addressing and investigating security incidences that arise. Convene Ad Hoc Security Committee as appropriate and provide leadership for breach response and notification actions for the Corporation. Develop, implement and administer technical security standards, as well as a suite of security services and tools to address and mitigate security risk. Provide leadership, direction and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies. Examine impacts of new technologies on the company s overall information security. Establish processes to review implementation of new technologies to ensure security compliance. Security Operations Manage all security delivery tools including anti-virus, IDS / IPS, traffic filtering, event monitoring and correlation Manage Identity and Access management. This includes the provisioning of systems access and segregations of duties across all platforms Manage endpoint security including group policy and anti-virus. Monitor internal control systems ensuring appropriate access levels are maintained. We will: Provide the opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally (pbprojectliving.com) The Team At Pitney Bowes, our passionate and ambitious team delivers innovations that help clients navigate the complex and always evolving world of commerce: from helping them use data to market to the best customers, to enabling the sending of parcels and packages efficiently, to securing payments through statements and invoices. In everything, we do, we deliver accuracy and precision to drive meaningful impact. Pitney Bowes is an Equal Employment Opportunity/Affirmative Action Employer that values diversity and inclusiveness in the workplace. W/M/Veterans/Individuals with Disabilities/LGBT are encouraged to apply. All interested individuals must apply online. Individuals with disabilities who cannot apply via our online application should refer to the alternate application options via our Individuals with Disabilities link. Associated topics: loss prevention, metal detection, monitor, patrol officer, public safety, public safety officer, safety officer, school, secure, watchman
Dec 04, 2019
What if your search didn t reveal your ideal job? Don t worry. Sign up now to get updates on our latest opportunities. And please, check back often to search again, as new positions are posted regularly. At Pitney Bowes, we do the right thing, the right way. As a Chief Information Security Officer for Pitney Bowes, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. You are: A Self-motivated Leader who can architect and steer consolidation and planning applications for the enterprise. You are a Loyal individual who will partner with the functional leaders to align business needs with IT solutions to create value. You will: Information Technology and Business Leadership Responsible for the strategic leadership of the company s information security program. Provide guidance and counsel to the VP, IT Infrastructure, the CIO and key members of the company s leadership team, working closely with senior business, technology leaders, and the employees in defining objectives for information security, while building relationships and goodwill. Work with business leadership to oversee the operations of a company-wide information security organization organized toward a common goal in information security. Promote collaborative, empowered working environments across locations, removing barriers and realizing possibilities. Manage company-wide information security governance processes, chair the Information Security Advisory Committee driving information security program and project priorities. Lead the information security planning processes to establish an inclusive and comprehensive information security program for the entire business in support of business, engineering and information systems. Establish security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements. Stay abreast of information security issues and regulatory changes affecting all aspects of our business and communicate to the company on a regular basis about those topics. Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position. Mentor and implement professional development plans for the Information Security team members. Represent the corporation on committees and boards in national and regional consortiums and collaborations Your background: As a Chief Information Security Officer, you have: Policy, Compliance and Audit Led the development and implementation of effective policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation. Led efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the company s information and technology systems. Work with internal audit, external auditors, clients, prospective clients and outside consultants on required security assessments and audits. Coordinate and track all information technology and security related audits including scope of audits, departments involved, timelines, auditing agencies and outcomes. Work with auditors as appropriate to keep audit focus in scope, maintain excellent relationships with audit entities and provide a consistent perspective that continually puts the company in its best light. Provide guidance, evaluation and advocacy on audit responses. Work with technology, business and compliance leadership to build cohesive security and compliance programs for the corporation effectively addressing state and federal statutory and regulatory requirements. Develop a strategy for dealing with increasing number of audits, compliance checks and external assessment processes for internal/external auditors, PCI, SOX, HIPAA, and FISMA. Outreach, Education and Training Work closely with IT leaders, technical experts and business leaders across the company on a wide variety of security issues that require an in-depth understanding of the technology supporting their operations, as well as the engineering landscape. Create education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilities. Work with various groups in Information Technology, Business and Engineering to build awareness and a sense of common purpose around security. Pursue employee security initiatives to address unique needs in protecting identity theft, mobile social media security and online reputation program. Risk Management and Incident Response Keep abreast of security incidents and act as primary control point during significant information security incidents. Convene a Security Incident Response Team (SIRT) as needed, or requested, in addressing and investigating security incidences that arise. Convene Ad Hoc Security Committee as appropriate and provide leadership for breach response and notification actions for the Corporation. Develop, implement and administer technical security standards, as well as a suite of security services and tools to address and mitigate security risk. Provide leadership, direction and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies. Examine impacts of new technologies on the company s overall information security. Establish processes to review implementation of new technologies to ensure security compliance. Security Operations Manage all security delivery tools including anti-virus, IDS / IPS, traffic filtering, event monitoring and correlation Manage Identity and Access management. This includes the provisioning of systems access and segregations of duties across all platforms Manage endpoint security including group policy and anti-virus. Monitor internal control systems ensuring appropriate access levels are maintained. We will: Provide the opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally (pbprojectliving.com) The Team At Pitney Bowes, our passionate and ambitious team delivers innovations that help clients navigate the complex and always evolving world of commerce: from helping them use data to market to the best customers, to enabling the sending of parcels and packages efficiently, to securing payments through statements and invoices. In everything, we do, we deliver accuracy and precision to drive meaningful impact. Pitney Bowes is an Equal Employment Opportunity/Affirmative Action Employer that values diversity and inclusiveness in the workplace. W/M/Veterans/Individuals with Disabilities/LGBT are encouraged to apply. All interested individuals must apply online. Individuals with disabilities who cannot apply via our online application should refer to the alternate application options via our Individuals with Disabilities link. Associated topics: loss prevention, metal detection, monitor, patrol officer, public safety, public safety officer, safety officer, school, secure, watchman
Chief Information Security Officer (Yakima)
Pitney Bowes Yakima, WA, USA
What if your search didn t reveal your ideal job? Don t worry. Sign up now to get updates on our latest opportunities. And please, check back often to search again, as new positions are posted regularly. At Pitney Bowes, we do the right thing, the right way. As a Chief Information Security Officer for Pitney Bowes, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. You are: A Self-motivated Leader who can architect and steer consolidation and planning applications for the enterprise. You are a Loyal individual who will partner with the functional leaders to align business needs with IT solutions to create value. You will: Information Technology and Business Leadership Responsible for the strategic leadership of the company s information security program. Provide guidance and counsel to the VP, IT Infrastructure, the CIO and key members of the company s leadership team, working closely with senior business, technology leaders, and the employees in defining objectives for information security, while building relationships and goodwill. Work with business leadership to oversee the operations of a company-wide information security organization organized toward a common goal in information security. Promote collaborative, empowered working environments across locations, removing barriers and realizing possibilities. Manage company-wide information security governance processes, chair the Information Security Advisory Committee driving information security program and project priorities. Lead the information security planning processes to establish an inclusive and comprehensive information security program for the entire business in support of business, engineering and information systems. Establish security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements. Stay abreast of information security issues and regulatory changes affecting all aspects of our business and communicate to the company on a regular basis about those topics. Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position. Mentor and implement professional development plans for the Information Security team members. Represent the corporation on committees and boards in national and regional consortiums and collaborations Your background: As a Chief Information Security Officer, you have: Policy, Compliance and Audit Led the development and implementation of effective policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation. Led efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the company s information and technology systems. Work with internal audit, external auditors, clients, prospective clients and outside consultants on required security assessments and audits. Coordinate and track all information technology and security related audits including scope of audits, departments involved, timelines, auditing agencies and outcomes. Work with auditors as appropriate to keep audit focus in scope, maintain excellent relationships with audit entities and provide a consistent perspective that continually puts the company in its best light. Provide guidance, evaluation and advocacy on audit responses. Work with technology, business and compliance leadership to build cohesive security and compliance programs for the corporation effectively addressing state and federal statutory and regulatory requirements. Develop a strategy for dealing with increasing number of audits, compliance checks and external assessment processes for internal/external auditors, PCI, SOX, HIPAA, and FISMA. Outreach, Education and Training Work closely with IT leaders, technical experts and business leaders across the company on a wide variety of security issues that require an in-depth understanding of the technology supporting their operations, as well as the engineering landscape. Create education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilities. Work with various groups in Information Technology, Business and Engineering to build awareness and a sense of common purpose around security. Pursue employee security initiatives to address unique needs in protecting identity theft, mobile social media security and online reputation program. Risk Management and Incident Response Keep abreast of security incidents and act as primary control point during significant information security incidents. Convene a Security Incident Response Team (SIRT) as needed, or requested, in addressing and investigating security incidences that arise. Convene Ad Hoc Security Committee as appropriate and provide leadership for breach response and notification actions for the Corporation. Develop, implement and administer technical security standards, as well as a suite of security services and tools to address and mitigate security risk. Provide leadership, direction and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies. Examine impacts of new technologies on the company s overall information security. Establish processes to review implementation of new technologies to ensure security compliance. Security Operations Manage all security delivery tools including anti-virus, IDS / IPS, traffic filtering, event monitoring and correlation Manage Identity and Access management. This includes the provisioning of systems access and segregations of duties across all platforms Manage endpoint security including group policy and anti-virus. Monitor internal control systems ensuring appropriate access levels are maintained. We will: Provide the opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally (pbprojectliving.com) The Team At Pitney Bowes, our passionate and ambitious team delivers innovations that help clients navigate the complex and always evolving world of commerce: from helping them use data to market to the best customers, to enabling the sending of parcels and packages efficiently, to securing payments through statements and invoices. In everything, we do, we deliver accuracy and precision to drive meaningful impact. Pitney Bowes is an Equal Employment Opportunity/Affirmative Action Employer that values diversity and inclusiveness in the workplace. W/M/Veterans/Individuals with Disabilities/LGBT are encouraged to apply. All interested individuals must apply online. Individuals with disabilities who cannot apply via our online application should refer to the alternate application options via our Individuals with Disabilities link. Associated topics: loss prevention, metal detection, monitor, patrol officer, public safety, public safety officer, safety officer, school, secure, watchman
Dec 04, 2019
What if your search didn t reveal your ideal job? Don t worry. Sign up now to get updates on our latest opportunities. And please, check back often to search again, as new positions are posted regularly. At Pitney Bowes, we do the right thing, the right way. As a Chief Information Security Officer for Pitney Bowes, you can too. We have amazing people who are the driving force, the inspiration and foundation of our company. Our thriving culture can be broken down into four components: Client. Team. Win. Innovate. We actively look for prospects who: Are passionate about client success. Enjoy collaborating with others. Strive to exceed expectations. Move boldly in the quest for superior and best in market solutions. You are: A Self-motivated Leader who can architect and steer consolidation and planning applications for the enterprise. You are a Loyal individual who will partner with the functional leaders to align business needs with IT solutions to create value. You will: Information Technology and Business Leadership Responsible for the strategic leadership of the company s information security program. Provide guidance and counsel to the VP, IT Infrastructure, the CIO and key members of the company s leadership team, working closely with senior business, technology leaders, and the employees in defining objectives for information security, while building relationships and goodwill. Work with business leadership to oversee the operations of a company-wide information security organization organized toward a common goal in information security. Promote collaborative, empowered working environments across locations, removing barriers and realizing possibilities. Manage company-wide information security governance processes, chair the Information Security Advisory Committee driving information security program and project priorities. Lead the information security planning processes to establish an inclusive and comprehensive information security program for the entire business in support of business, engineering and information systems. Establish security and compliance goals, define security strategies, metrics, reporting mechanisms and program services; and create maturity models and a roadmap for continual program improvements. Stay abreast of information security issues and regulatory changes affecting all aspects of our business and communicate to the company on a regular basis about those topics. Engage in professional development to maintain continual growth in professional skills and knowledge essential to the position. Mentor and implement professional development plans for the Information Security team members. Represent the corporation on committees and boards in national and regional consortiums and collaborations Your background: As a Chief Information Security Officer, you have: Policy, Compliance and Audit Led the development and implementation of effective policies and practices to secure protected and sensitive data and ensure information security and compliance with relevant legislation and legal interpretation. Led efforts to internally assess, evaluate and make recommendations to management regarding the adequacy of the security controls for the company s information and technology systems. Work with internal audit, external auditors, clients, prospective clients and outside consultants on required security assessments and audits. Coordinate and track all information technology and security related audits including scope of audits, departments involved, timelines, auditing agencies and outcomes. Work with auditors as appropriate to keep audit focus in scope, maintain excellent relationships with audit entities and provide a consistent perspective that continually puts the company in its best light. Provide guidance, evaluation and advocacy on audit responses. Work with technology, business and compliance leadership to build cohesive security and compliance programs for the corporation effectively addressing state and federal statutory and regulatory requirements. Develop a strategy for dealing with increasing number of audits, compliance checks and external assessment processes for internal/external auditors, PCI, SOX, HIPAA, and FISMA. Outreach, Education and Training Work closely with IT leaders, technical experts and business leaders across the company on a wide variety of security issues that require an in-depth understanding of the technology supporting their operations, as well as the engineering landscape. Create education and awareness programs and advise operating units at all levels on security issues, best practices, and vulnerabilities. Work with various groups in Information Technology, Business and Engineering to build awareness and a sense of common purpose around security. Pursue employee security initiatives to address unique needs in protecting identity theft, mobile social media security and online reputation program. Risk Management and Incident Response Keep abreast of security incidents and act as primary control point during significant information security incidents. Convene a Security Incident Response Team (SIRT) as needed, or requested, in addressing and investigating security incidences that arise. Convene Ad Hoc Security Committee as appropriate and provide leadership for breach response and notification actions for the Corporation. Develop, implement and administer technical security standards, as well as a suite of security services and tools to address and mitigate security risk. Provide leadership, direction and guidance in assessing and evaluating information security risks and monitor compliance with security standards and appropriate policies. Examine impacts of new technologies on the company s overall information security. Establish processes to review implementation of new technologies to ensure security compliance. Security Operations Manage all security delivery tools including anti-virus, IDS / IPS, traffic filtering, event monitoring and correlation Manage Identity and Access management. This includes the provisioning of systems access and segregations of duties across all platforms Manage endpoint security including group policy and anti-virus. Monitor internal control systems ensuring appropriate access levels are maintained. We will: Provide the opportunity to grow and develop your career Offer an inclusive environment that encourages diverse perspectives and ideas Deliver challenging and unique opportunities to contribute to the success of a transforming organization Offer comprehensive benefits globally (pbprojectliving.com) The Team At Pitney Bowes, our passionate and ambitious team delivers innovations that help clients navigate the complex and always evolving world of commerce: from helping them use data to market to the best customers, to enabling the sending of parcels and packages efficiently, to securing payments through statements and invoices. In everything, we do, we deliver accuracy and precision to drive meaningful impact. Pitney Bowes is an Equal Employment Opportunity/Affirmative Action Employer that values diversity and inclusiveness in the workplace. W/M/Veterans/Individuals with Disabilities/LGBT are encouraged to apply. All interested individuals must apply online. Individuals with disabilities who cannot apply via our online application should refer to the alternate application options via our Individuals with Disabilities link. Associated topics: loss prevention, metal detection, monitor, patrol officer, public safety, public safety officer, safety officer, school, secure, watchman
Entry Level Java Developer
Revature Yakima, WA, USA
Revature is the fastest growing employer of emerging technology talent in the US. We will hire over 300 new Entry Level Java Developers in the next 4 weeks. One day someone is going to ask you where you got your start This is IT! With a wide range of Fortune 500 enterprises, government organizations and top systems integrators as our clients, we not only provide you with the skills needed to succeed through an employer-paid training program but will also give you the opportunity to put those skills to use, on projects that matter . What We Are Looking For College degree (Associates or Bachelors) Must be authorized to work in the US Strong desire to learn to code No prior professional experience required. A natural problem solver Strong communication and interpersonal skills Willing to relocate anywhere in the US Relocation assistance provided What We Offer Competitive salary Relocation & housing assistance Health, vision & dental insurance Paid time off Industry Certifications Life Insurance Policy 401k Mentoring program and ongoing support throughout your entire Revature career Experience with the largest and most reputable companies in the US Apply Today. Interviews are going on now. #SoftwareEngineering Not Mentioned by Jobble Associated topics: application, back end, c c++, developer, matlab, perl, php, python, sde, software programmer
Dec 04, 2019
Revature is the fastest growing employer of emerging technology talent in the US. We will hire over 300 new Entry Level Java Developers in the next 4 weeks. One day someone is going to ask you where you got your start This is IT! With a wide range of Fortune 500 enterprises, government organizations and top systems integrators as our clients, we not only provide you with the skills needed to succeed through an employer-paid training program but will also give you the opportunity to put those skills to use, on projects that matter . What We Are Looking For College degree (Associates or Bachelors) Must be authorized to work in the US Strong desire to learn to code No prior professional experience required. A natural problem solver Strong communication and interpersonal skills Willing to relocate anywhere in the US Relocation assistance provided What We Offer Competitive salary Relocation & housing assistance Health, vision & dental insurance Paid time off Industry Certifications Life Insurance Policy 401k Mentoring program and ongoing support throughout your entire Revature career Experience with the largest and most reputable companies in the US Apply Today. Interviews are going on now. #SoftwareEngineering Not Mentioned by Jobble Associated topics: application, back end, c c++, developer, matlab, perl, php, python, sde, software programmer
Excellent Job Opportunity - SharePoint (Lead or Architect) with Power BI - Bellevue, WA (Yakima)
Sumeru Solutions Yakima, WA, USA
Role :- SharePoint Architect Location :- Washington, D.C. Job type :- Full-time/permanent Roles and responsibilities: Work with technical teams and business partners/specialists within various groups to understand the current state and constraints for defining the future state architecture of the applications & related interfaces. Identify requirements for opportunities for consolidation of efforts and allow early assessment of potential architectural impact resulting from business investments Provide technical leadership and mentoring to capability and product and development teams right from the idea creation stage, identifying also technical issues/risks and definition of mitigation approaches. Define end to end technical solutions that take into account the enterprise architecture strategies, current state environment and constraints. Analyses the viability of the solution to meet product timeline, budget and quality. Present product solution to different stakeholders Manage the application portfolio in terms of technology currency, business agility, technology evolution, business fit, opportunities to improve efficiencies and TCO. Review product level architectures and detailed designs in order to ensure compliance with the program level solution architecture and aligns with related roadmaps as applicable. Act as a coach and mentor to the development teams, assisting with detailed designs, development best practices, and code reviews where applicable Associated topics: application developer, design, develop, matlab, perl, programming, project architect, senior, senior software engineer, software engineer lead
Dec 04, 2019
Role :- SharePoint Architect Location :- Washington, D.C. Job type :- Full-time/permanent Roles and responsibilities: Work with technical teams and business partners/specialists within various groups to understand the current state and constraints for defining the future state architecture of the applications & related interfaces. Identify requirements for opportunities for consolidation of efforts and allow early assessment of potential architectural impact resulting from business investments Provide technical leadership and mentoring to capability and product and development teams right from the idea creation stage, identifying also technical issues/risks and definition of mitigation approaches. Define end to end technical solutions that take into account the enterprise architecture strategies, current state environment and constraints. Analyses the viability of the solution to meet product timeline, budget and quality. Present product solution to different stakeholders Manage the application portfolio in terms of technology currency, business agility, technology evolution, business fit, opportunities to improve efficiencies and TCO. Review product level architectures and detailed designs in order to ensure compliance with the program level solution architecture and aligns with related roadmaps as applicable. Act as a coach and mentor to the development teams, assisting with detailed designs, development best practices, and code reviews where applicable Associated topics: application developer, design, develop, matlab, perl, programming, project architect, senior, senior software engineer, software engineer lead
Make The Right Career Choice
  • Home
  • Contact
  • About Us
  • Terms & Conditions
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • Facebook
  • Twitter
  • Google Plus
  • LinkedIn
 
© 2008-2019 Powered by #OrbitJobs

Save

Save

Save