Cyber Security related articles

Brown University — Information Security Engineer

Brown University — Information Security Engineer

The Information Security Engineer is a member of the team responsible for implementation, monitoring, and maintenance of security systems, processes, policies, and compliance efforts in support of information security at Brown University.

University of North Carolina at Chapel Hill — Assistant Vice Chancellor & Chief Information Security Officer

University of North Carolina at Chapel Hill — Assistant Vice Chancellor & Chief Information Security Officer

Reporting to the Vice Chancellor for Information Technology & Chief Information Officer, the AVC-CISO will bring University stakeholders together in a commitment to information security best practices that appropriately balance mission, risk, and regulation.

Brown University - Watson Institute — Professor of Cyber and Security and International and Public Affairs

Brown University – Watson Institute — Professor of Cyber and Security and International and Public Affairs

The Watson Institute for International and Public Affairs at Brown University invites applications for a faculty position in “cyber and security” to begin in July 2023. We are seeking applicants whose research focuses on various aspects of the intersection between cyber technologies and human security.

Northeast Ohio Medical University — Director of Information Security

Northeast Ohio Medical University — Director of Information Security

The Director is responsible for NEOMED’s overall information security and risk management requirements and for working closely with the Chief Information Technology Officer, senior administration, and the university community on the development and delivery of a comprehensive information security strategy to optimize the security posture of the university

Coastal Carolina University — Information Security Manager

Coastal Carolina University — Information Security Manager

The Information Security Manager is responsible for managing, facilitating, monitoring, and implementing security policies, procedures, technical controls, and industry standards to effectively address the confidentiality, integrity, and availability of data as well as to ensure that the University information resources are secure from unauthorized access, protected from inappropriate alteration, and physically secure.