Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
The Data and Cyber Security Manager manages IS security analysts to ensure that all applications are functional and secure. Responsible for developing and managing Information Systems cyber security, including disaster recovery, database protection and software development. Being an Data and Cyber Security Manager implements procedures and methods for auditing and addressing non-compliance to information security standards. Develops and delivers IS security standards, best practices, architecture and systems to ensure information system security across the enterprise. In addition, Data and Cyb more...
The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...
The Data Security Analyst V designs and implements information security standards for applications and databases. Identifies potential information and network or internet security vulnerabilities. Being an Data Security Analyst V ensures site security and provides consultation on security issues staying abreast of current malware and other potential internet security threats. Conducts analysis, investigates and recommends security technologies. In addition, Data Security Analyst V typically requires a bachelor's degree. Typically reports to a manager. Being an Data Security Analyst V works on more...
The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...
The Data Security Analyst II protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst II implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst II typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst II gains exp more...
The Data and Cyber Security Supervisor implements standards and audit procedures to identify and resolve security violations. Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Being a Data and Cyber Security Supervisor may require a bachelor's degree in area of specialty. Conducts disaster recovery and cyberattack preparation and training. In addition, Data and Cyber Security Supervisor typically reports to a manager or head of a unit/department. The Data and Cyber Security Supervisor supe more...
The Data Security Analyst I protects against unauthorized access, modification, or destruction. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst I implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst I typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst I works on projects/matters of limited complexity in a support more...
Manages the maintenance and development of data systems. Leads projects to improve the usability, scalability, efficiency, and security of an organization's data resources. These can include data migrations, data governance initiatives, and data management and architecture projects. Leads teams in designing, developing, and testing new or reconfigured data systems. Ensures data systems integrate well with data solutions, modeling, and analytics initiatives. Requires a bachelor's degree. Typically reports to a director. Manages subordinate staff in the day-to-day performance of their jobs. True more...
Manages data center operations to ensure the performance, availability, and security of an organization's data. Implements procedures and policies for installing, configuring, and maintaining servers, networks, and storage systems within a data center to maximize operational efficiency. Manages environmental conditions to ensure optimal temperature, humidity, and power supply to prevent downtime and protect hardware from damage. Provides timely, accurate, and consistent technical infrastructure service and presentation to internal and external clients. Requires a bachelor's degree. Typically r more...
Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Researches and evaluates new or improved security measures to implement for Web systems' security. Requires a bachelor's degree. Typically reports to a manager or head of a unit/department. Typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Typically requi more...
Simplify survey management, participation, and analysis with a single, centralized library for all your compensation data sources. Streamline your survey selection, data loading, participation, and analysis. Automatically participate in surveys with one-click exports to third-party survey participation templates.
An accurate job description starts with collaboration.
With JobArchitect you can share job descriptions with hiring managers and others in your organization and easily manage the review and approval process using the centralized command center.
Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.
Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.