Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...
Supports operations and conducts data analytics projects to provide information and insights to stakeholders for decision-making or solution development. Implements data standards and deploys automation tools to extract, synthesize, and validate data from different sources and transform data into usable metrics. Constructs data sets, monitors data quality, troubleshoots and resolves database issues to ensure data integrity. Utilizes scripting and querying tools like Python, R or SQL, data visualization/BI tools, statistical methods, and data modeling to produce reports, data files, and dashboa more...
Supports and contributes to external business analytics projects and processes to provide data-driven insights used to advise the client and develop strategies for operational improvements and future business initiatives. Uses statistical methods, modeling, analytical methodologies, and data analysis to develop and deploy tools including dashboards, infographics, reports, and models to inform and support decision-making. Mines, processes, and analyzes internal and external data using KPIs, business results, industry sources, competitor intelligence, and customer information. Develops a good un more...
Ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager. Work is highly independent. May assume a team lead role for the work group. A s more...
The Security Threat Analyst IV conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Security Threat Analyst IV documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In addition, more...
The Cyber Security Analyst IV maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Investigates, reports, and responds to detected cyber incidents. Being a Cyber Security Analyst IV proactively searches for threats using a variety of Computer Network Defense (CND) tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs. Identifies the specific vulnerability and makes recommendations for remediation. In addition, Cyber Security Analyst IV doc more...
Plans and designs security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information more...
The Data Security Analyst V designs and implements information security standards for applications and databases. Identifies potential information and network or internet security vulnerabilities. Being an Data Security Analyst V ensures site security and provides consultation on security issues staying abreast of current malware and other potential internet security threats. Conducts analysis, investigates and recommends security technologies. In addition, Data Security Analyst V typically requires a bachelor's degree. Typically reports to a manager. Being an Data Security Analyst V works on more...
Responsible for the design and management of an organization's cloud systems, applications, policies, and strategy. Evaluates and identifies the best cloud solutions for the organization. Develops and modifies scalable architecture to support applications and infrastructure-as-a-service (IAAS) and platform-as-a-service (PAAS) platforms. Ensures the security and compliance of cloud environments, including data protection and privacy. Monitors and analyzes cloud infrastructure performance to identify and resolve issues proactively. Collaborates with cross-functional teams to optimize cloud-based more...
The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...
Simplify survey management, participation, and analysis with a single, centralized library for all your compensation data sources. Streamline your survey selection, data loading, participation, and analysis. Automatically participate in surveys with one-click exports to third-party survey participation templates.
An accurate job description starts with collaboration.
With JobArchitect you can share job descriptions with hiring managers and others in your organization and easily manage the review and approval process using the centralized command center.
Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.
Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.