Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
The Data and Cyber Security Supervisor implements standards and audit procedures to identify and resolve security violations. Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Being a Data and Cyber Security Supervisor may require a bachelor's degree in area of specialty. Conducts disaster recovery and cyberattack preparation and training. In addition, Data and Cyber Security Supervisor typically reports to a manager or head of a unit/department. The Data and Cyber Security Supervisor supe more...
Supervises the administration of data center operations to ensure the performance, availability, and security of data. Installs, configures, and maintains servers, networks, and storage systems according to established procedures and policies. Monitors and maintains environmental conditions to ensure optimal temperature, humidity, and power supply to prevent downtime and protect hardware from damage. Provides timely, accurate, and consistent technical infrastructure service and presentation to internal and external clients. Typically requires a bachelor's degree. Typically reports to a manager more...
Supervises a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Assists in the development of security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Creates action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybersecurity threats. Utilizes security information and event management (SEIM), data loss prevention (DLP), intrusi more...
Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Implements standards and audit procedures to identify and resolve security violations. Conducts disaster recovery and cyberattack preparation and training. May require a bachelor's degree in area of specialty. Typically reports to a manager or head of a unit/department. Supervises a group of primarily para-professional level staffs. May also be a level above a supervisor within high volume administrative/ production environments. Makes day- more...
Supervises a team of security officers and guards that ensure the physical safety of all visitors, employees, or customers to the organization's facilities and the security of property and assets. Schedules guard shifts. Conducts audits and inspections of buildings and grounds to ensure protection from intruders, fire hazards, theft, and vandalism. Follows protocols for the monitoring of systems and alarms, and procedures for response to issues. Ensures that all security events are logged, documented, and reported using standard procedures. Trains staff and establishes plans for crisis respons more...
Leads a team in developing, implementing, and maintaining classified security programs and protocols in accordance with all relevant government standards and regulations for the management of classified information and materials. Ensures that staff, consultants, and visitors possess appropriate security clearances and handle documents and materials appropriately. Monitors access to, and security of, controlled facilities or information. Oversees projects to identify potential weaknesses or risks. Briefs and trains personnel on proper security procedures and protocols. Investigates any security more...
The Information Security Architect Supervisor assists in the development of security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Supervises a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Being an Information Security Architect Supervisor utilizes security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in action plan desi more...
The IT Security Architect Supervisor assists in the development of security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Supervises a team of cybersecurity professionals that plan and design security solutions that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Being an IT Security Architect Supervisor utilizes security information and event management (SEIM), data loss prevention (DLP), intrusion prevention systems (IPS), and other tools in action plan designs. Creates actio more...
The Data Center Operations Supervisor installs, configures, and maintains servers, networks, and storage systems according to established procedures and policies. Supervises the administration of data center operations to ensure the performance, availability, and security of data. Being a Data Center Operations Supervisor provides timely, accurate, and consistent technical infrastructure service and presentation to internal and external clients. Monitors and maintains environmental conditions to ensure optimal temperature, humidity, and power supply to prevent downtime and protect hardware fro more...
The Data Infrastructure Operations Supervisor installs, configures, and maintains servers, networks, and storage systems according to established procedures and policies. Supervises the administration of data center operations to ensure the performance, availability, and security of data. Being a Data Infrastructure Operations Supervisor provides timely, accurate, and consistent technical infrastructure service and presentation to internal and external clients. Monitors and maintains environmental conditions to ensure optimal temperature, humidity, and power supply to prevent downtime and prot more...
CompAnalyst delivers faster decision making, and new insights into your pay practices. You can explore new intersections between market, company, and employee data with enhanced data integrations.With powerful tools and streamlined workflows, you can price jobs quickly and access the information you need to get pay right.
Creating job descriptions can be challenging, but it doesn't have to be.
With JobArchitect you can easily build and standardize your job descriptions using your existing content, format and branding or use one of the templates from our extensive library. And you can access CompAnalyst® job summaries or search across local job postings to write descriptions with ease.
To simplify things further, we make it easy to publish job postings from an approved job description.
Get comprehensive data and insights from your peers in the global pay markets you care about most. Connect your global teams to the pricing intelligence they need to recruit and retain talent in 100 countries.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.