Information Security Professional Education, Training & Library - Charlotte, NC at Geebo

Information Security Professional

Have you made the decision to dive head-first into Security responsibilities, and are now looking to provide safety and security to large-scale projects?.
While supporting Enterprise projects for one of the largest and most successful telecom presences in the world, this InfoSec pro will be responsible for desktop software, operating system and remote access issues.
t.
This will create a great learning opportunity along with a unique working environment.
Required Skills & Experience 2.
5
years IT experience for Security specialization Previous Sec role on dedicated Security team Windows infrastructure experience Support audits including PC1, SOC1, HIPAA and CMR Desired Skills & Experience Bachelor's degree a plus Telecom experience an asset Some Linux Applicants must be currently authorized to work in the United States on a full-time basis now and in the future.
Accommodation will be provided in all parts of the hiring process as required under Motion Recruitment's Employment Accommodation policy.
Applicants need to make their needs known in advance.
#LI-AC1 Information Security Professional Recommended Skills Auditing Hardworking And Dedicated Health Insurance Portability And Accountability Act (Hipaa) Compliance Infrastructure Management Linux Telecommunications Apply to this job.
Think you're the perfect candidate? Apply on company site $('.
external-apply-email-saved').
on('click', function (event) window.
ExternalApply = window.
open('/interstitial?jobdid=j3r0s66b9pktj5p8rsf', 'ExternalApply-j3r0s66b9pktj5p8rsf'); ); Estimated Salary: $20 to $28 per hour based on qualifications.

Don't Be a Victim of Fraud

  • Electronic Scams
  • Home-based jobs
  • Fake Rentals
  • Bad Buyers
  • Non-Existent Merchandise
  • Secondhand Items
  • More...

Don't Be Fooled

The fraudster will send a check to the victim who has accepted a job. The check can be for multiple reasons such as signing bonus, supplies, etc. The victim will be instructed to deposit the check and use the money for any of these reasons and then instructed to send the remaining funds to the fraudster. The check will bounce and the victim is left responsible.