Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
The Data and Cyber Security Manager manages IS security analysts to ensure that all applications are functional and secure. Responsible for developing and managing Information Systems cyber security, including disaster recovery, database protection and software development. Being an Data and Cyber Security Manager implements procedures and methods for auditing and addressing non-compliance to information security standards. Develops and delivers IS security standards, best practices, architecture and systems to ensure information system security across the enterprise. In addition, Data and Cyb more...
The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...
The Data Security Analyst V designs and implements information security standards for applications and databases. Identifies potential information and network or internet security vulnerabilities. Being an Data Security Analyst V ensures site security and provides consultation on security issues staying abreast of current malware and other potential internet security threats. Conducts analysis, investigates and recommends security technologies. In addition, Data Security Analyst V typically requires a bachelor's degree. Typically reports to a manager. Being an Data Security Analyst V works on more...
The Data Security Analyst III protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst III understands internet architecture and firewall configuration to protect system security. Works with end users to determine needs of individual departments. In addition, Data Security Analyst III may need to authorize user access and familiar with domain structures and digital signatures. Requires a bachelor's degree or more...
The Data Security Analyst II protects against unauthorized access, modification, or destruction and develops IT security policies and standards. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst II implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst II typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst II gains exp more...
The Data and Cyber Security Supervisor implements standards and audit procedures to identify and resolve security violations. Supervises professionals in the development, implementation, and maintenance of standards and systems that will ensure secure information systems and data. Being a Data and Cyber Security Supervisor may require a bachelor's degree in area of specialty. Conducts disaster recovery and cyberattack preparation and training. In addition, Data and Cyber Security Supervisor typically reports to a manager or head of a unit/department. The Data and Cyber Security Supervisor supe more...
The Data Security Analyst I protects against unauthorized access, modification, or destruction. Completes tasks designed to ensure security of the organization's systems and information assets. Being an Data Security Analyst I implements policies or procedures and tracks compliance throughout the organization. Works with end users to determine needs of individual departments. In addition, Data Security Analyst I typically requires a bachelor's degree or its equivalent. Typically reports to a manager. Being an Data Security Analyst I works on projects/matters of limited complexity in a support more...
Responsible for developing and managing Information Systems cyber security, including disaster recovery, database protection and software development. Manages IS security analysts to ensure that all applications are functional and secure. Develops and delivers IS security standards, best practices, architecture and systems to ensure information system security across the enterprise. Implements procedures and methods for auditing and addressing non-compliance to information security standards. Migrates non-compliant environments to compliant environments. Evaluates the organization to ensure co more...
Responsible for designing, implementing, and maintaining security measures to support the information and data security needs of the company's Web presence. Researches and evaluates new or improved security measures to implement for Web systems' security. Requires a bachelor's degree. Typically reports to a manager or head of a unit/department. Typically manages through subordinate managers and professionals in larger groups of moderate complexity. Provides input to strategic decisions that affect the functional area of responsibility. May give input into developing the budget. Typically requi more...
Manages a team of cybersecurity professionals that plan and design security solutions and capabilities that enable the organization to identify, protect, detect, respond, and recover from cyber threats and vulnerabilities. Defines and develops security requirements using risk assessments, threat modeling, testing, and analysis of existing systems. Develops security integration plans to protect existing infrastructure and to incorporate future solutions. Designs action plans for policy creation and governance, system hardening, monitoring, incident response, disaster recovery, and emerging cybe more...
CompAnalyst delivers faster decision making, and new insights into your pay practices. You can explore new intersections between market, company, and employee data with enhanced data integrations.With powerful tools and streamlined workflows, you can price jobs quickly and access the information you need to get pay right.
Creating job descriptions can be challenging, but it doesn't have to be.
With JobArchitect you can easily build and standardize your job descriptions using your existing content, format and branding or use one of the templates from our extensive library. And you can access CompAnalyst® job summaries or search across local job postings to write descriptions with ease.
To simplify things further, we make it easy to publish job postings from an approved job description.
Get comprehensive data and insights from your peers in the global pay markets you care about most. Connect your global teams to the pricing intelligence they need to recruit and retain talent in 100 countries.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.