Smarter prices start with HR-reported pay data
Employees: Get a Salary Increase
Ensures the security of an organization's networks and systems. Performs network security assessments and risk analysis, and makes recommendations to improve network security. Investigates security incidents and breaches. Recommends and deploys appropriate security products and solutions for various network platforms. Configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requires a bachelor's degree. Typically reports to a manager. Work is highly independent. May assume a team lead role for the work group. A s more...
The Data Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Data Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Data Security Analyst IV trains security aw more...
The Security Threat Analyst IV conducts manual and automated penetration tests including black-box, gray-box, and white-box. Performs penetration testing to assess and identify security vulnerabilities of networks, applications, and systems. Being a Security Threat Analyst IV documents testing results and presents suggestions for the development of countermeasures, security improvements, and mitigation strategies. Evaluates findings and performs root cause analysis to identify weaknesses, misconfigurations, or other flaws in the environment that could lead to security compromises. In addition, more...
The Cyber Security Analyst IV maintains system cybersecurity monitoring operations, and performs cyber incident triage to determine scope, urgency, and potential impact of the incident. Investigates, reports, and responds to detected cyber incidents. Being a Cyber Security Analyst IV proactively searches for threats using a variety of Computer Network Defense (CND) tools, including intrusion detection system alerts, firewall and network traffic logs, and host system logs. Identifies the specific vulnerability and makes recommendations for remediation. In addition, Cyber Security Analyst IV doc more...
The Network Risk and Security Analyst IV performs network security assessments and risk analysis, and makes recommendations to improve network security. Ensures the security of an organization's networks and systems. Being a Network Risk and Security Analyst IV recommends and deploys appropriate security products and solutions for various network platforms. Investigates security incidents and breaches. In addition, Network Risk and Security Analyst IV configures and maintains firewalls and other network security tools and software. May conduct security trainings with employees. Typically requi more...
The Information Systems Security Analyst IV collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Designs and implements information security standards for applications and databases. Being an Information Systems Security Analyst IV assesses client needs against security concerns and resolves information security risk issues. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. In addition, Information S more...
Designs and implements information security standards for applications and databases. Collaborates with a team of information security analysts to provide subject matter expertise on application development, database design, and network maintenance. Researches and advocates the latest technologies and solutions to support the security requirements of internal and external customers. Assesses client needs against security concerns and resolves information security risk issues. Trains security awareness to business partners and IT staff. Requires a bachelor's degree or its equivalent. Typically more...
Analyzes systems and networks to determine deviations from approved policies and configurations. Evaluates incident response procedures and capabilities. Conducts security scans, examines system configurations, and reviews documentation of incident response procedures. Analyzes identified malicious network activity to determine weaknesses exploited, exploitation methods, and the effects on the system. Typically requires a bachelor's degree in computer science. Typically reports to a manager. Work is highly independent. May assume a team lead role for the work group. A specialist on complex tec more...
Analyzes business needs and processes to assist with developing, implementing, and maintaining the organization's SAP Enterprise Resource Planning (ERP) applications. Coordinates with cross-functional teams to gather requirements by understanding workflow, goals, and processes. Acts as liaison between the development teams and business stakeholders to ensure that SAP solutions align with business objectives. Documents business requirements, functional specifications, and process maps to serve as a reference for the organization. Analyzes system performance and user feedback to identify opportu more...
Responsible for the design and management of an organization's cloud systems, applications, policies, and strategy. Evaluates and identifies the best cloud solutions for the organization. Develops and modifies scalable architecture to support applications and infrastructure-as-a-service (IAAS) and platform-as-a-service (PAAS) platforms. Ensures the security and compliance of cloud environments, including data protection and privacy. Monitors and analyzes cloud infrastructure performance to identify and resolve issues proactively. Collaborates with cross-functional teams to optimize cloud-based more...
Simplify survey management, participation, and analysis with a single, centralized library for all your compensation data sources. Streamline your survey selection, data loading, participation, and analysis. Automatically participate in surveys with one-click exports to third-party survey participation templates.
An accurate job description starts with collaboration.
With JobArchitect you can share job descriptions with hiring managers and others in your organization and easily manage the review and approval process using the centralized command center.
Get comprehensive, reliable US compensation data for your specific industry, company size, and labor market.
Browse our complete catalog, showcasing more than 30 regional and global surveys with all the information and data points you need to get pay right.
Adjust Employee SalaryIndividualize employee pay based on unique job requirements and personal qualifications. |
|
Price My Industry JobsGet the latest market pricing for benchmark jobs and jobs in your industry. |
|
Individualize employee pay based on unique job requirements and personal qualifications.
Get the latest market pricing for benchmark jobs and jobs in your industry.
Analyze the market and your qualifications to negotiate your salary with confidence.
Search thousands of open positions to find your next opportunity.