ISACA CareerLaser

ISACA

Career Opportunities
Flowers Foods
Thomasville, Georgia

Visit http://jobs.isaca.org/jobs/10857931/ to view the full article online.

 
Five9
San Ramon, California

Visit http://jobs.isaca.org/jobs/10893588/ to view the full article online.

 
Colorado Office of the State Auditor
Denver, Colorado

Visit http://jobs.isaca.org/jobs/10906366/legislative-it-auditor to view the full article online.

 
CohnReznick LLP
New York, New York

Visit http://jobs.isaca.org/jobs/10849151/it-audit-senior-associate to view the full article online.

 
Citizens
Jacksonville, Florida

Visit http://jobs.isaca.org/jobs/10781479/director-it-security-risk to view the full article online.

 
Virginia Retirement System
Richmond, Virginia

Visit http://jobs.isaca.org/jobs/10903310/principal-auditor-data-analysis-operations to view the full article online.

 
Rockwell Automation
Milwaukee, Wisconsin

Visit http://jobs.isaca.org/jobs/10913215/data-management-analyst to view the full article online.

 
Workplace Safety & Insurance Board
Toronto, Ontario, Canada

Visit http://jobs.isaca.org/jobs/10845024/senior-it-auditor to view the full article online.

 
Cooper Tire & Rubber Company
Findlay, Ohio

Visit http://jobs.isaca.org/jobs/10827138/lead-security-controls-analyst to view the full article online.

 
City of Pompano Beach
Pompano Beach, Florida

Visit http://jobs.isaca.org/jobs/10845326/deputy-internal-auditor to view the full article online.

 
Market Watch
 
Industry Outlook
By Collin Eaton, Enterprise Security Today
The last two years have seen a sharp increase in sophisticated cyberattacks against U.S. energy facilities. Engineers and control systems administrators are primary targets for hackers attempting to gain control of crucial facilities across the country.

Visit http://www.enterprise-security-today.com/story.xhtml?story_id=021002CS1L33 to view the full article online.

 
By Alison DeNisco Rayome, Tech Republic
IT interviews shouldn’t just be about accepting or rejecting a candidate after a cookie cutter interview. Here are some tips for adding value to your company through exceptional interview practices.

Visit https://www.techrepublic.com/article/throw-out-the-whiteboard-3-ways-to-improve-the-technical-interview/ to view the full article online.

 
By Javvad Malik, Dark Reading
Computer worms exploit every available computer insecurity to mine data and damage online systems. Here, one such worm shares its journey from creation to termination, shedding some light on its online activities and failures along the way.

Visit https://www.darkreading.com/vulnerabilities---threats/780-days-in-the-life-of-a-computer-worm/a/d-id/1331351 to view the full article online.

 
Upcoming Events