technology

now browsing by tag

 
 

Where #Emerging #Cybersecurity #Technology Fits in Your #Business

Source: National Cyber Security – Produced By Gregory Evans

Where #Emerging #Cybersecurity #Technology Fits in Your #Business

As 2017 enters the final stretch, security professionals still find themselves locked in a furious battle with hackers.

Some 80 percent of the IT and security executives surveyed for the most recent AT&T Cybersecurity Insights report said their organizations came under attack during the previous 12 months. The percentage soars to 96 percent for companies in the technology industry.

All the more reason why enterprise defenders are under acute pressure to create multiple layers of defense, detection and mitigation to withstand future attacks. But what worked in the past is no guarantee it will work in the future. This is a threat landscape that is fluid and changes from one year to the next.

Tool Up for the Long Haul

In the end, a good cyberdefense strategy depends on making hard decisions that correctly match investments against an organization’s risk profile. There’s never a one-size-fits-all solution, but the approach should start with the recognition that breaches are inevitable. Then it’s up to management to select countermeasures that will mitigate potential damage, all the while ordering steps to routinely tighten up vulnerabilities in order to reduce the risk of a devastating attack.

The stakes are as high as ever: Ponemon Institute estimates the average cost of a data breach in 2017 at $3.6 million. But in the AT&T report, 65 percent of the executives surveyed expressed confidence about their ability to handle cybersecurity challenges in the coming year.

Also, more than two-thirds (70 percent) of them said they plan to increase their investments in next-generation security technologies, including threat analytics, cloud security solutions and machine learning.

New skills will clearly be in high demand as organizations seek to deploy next-generation technologies in areas such as cloud security, data science and analytics. And as more information gets pumped out daily, artificial security intelligence will become increasingly important.

Clearly, those new tools and techniques would not only come in handy against their adversaries. They can also help bridge gaps in their cybersecurity defenses exacerbated by a nagging skills shortage. But what if they don’t have the personnel to deploy them?

Half of the organizations surveyed by AT&T indicated they plan to increase their security staffs over the next 12 months. However, talent has never been as tough to come by. The U.S. has a reported skills gap of 300,000 cybersecurity experts. The shortage is particularly evident when it comes to threat prevention, threat detection and threat analysis – three of the most important areas of any cyberdefense.

Even those organizations that lean heavily toward security technology can be hard-pressed to stay abreast of the rapid advances in security defense because of the state of the IT jobs marketplace.

In the interim, one option is to increase the use of outside consultants and managed service providers, who can provide the needed next-gen capabilities to deal with this ever-changing constellation of cyberthreats.

These specialists are able to attract top-of-the-line talent and can implement cutting-edge security technologies rapidly. They also can deploy analytics that generate deep insights about the overall threat landscape – knowledge that can be shared with all of their customers to strengthen their own defensive postures.

The post Where #Emerging #Cybersecurity #Technology Fits in Your #Business appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

IT Technology Technical Support Supervisor

Source: National Cyber Security – Produced By Gregory Evans

IT Technology Technical Support Supervisor

This vacancy serves on the Executive Administration at Pride Drive in Hammond, Louisiana.

Only permanent employees of Florida Parishes Human Services Authority (FPHSA) will be considered for this vacancy.
 
Please refer to the ‘Job Specifications’ tab located at the top of the LA Careers Current Job Opportunities’ page of the Civil Service website for specific information on salary ranges, minimum qualifications and job concepts for each level.
 
No Civil Service test score is required in order to be considered for this vacancy.

To apply for this vacancy, click on the “Apply” link above and complete an electronic application which can be used for this vacancy as well as future job opportunities.  Applicants are responsible for checking the status of their application to determine where they are in the recruitment process by selecting the ‘Applications’ link after logging into their account.  Below are the most common status messages and their meanings.

Application received – Your application has been submitted successfully.

Evaluating experience – Your application is being reviewed to ensure you meet the minimum qualifications for the position.

Minimum Qualification Review – See History – Click the History link for the results of your application review.  Passing candidates will designate as “Pass”.  Failing candidates will designate as “Fail”.

Eligible for consideration – You are among a group of applicants who MAY be selected for the position.

Eligible Pending Supplemental Qualification Review – Only candidates meeting the supplemental qualification will be eligible for referral.

Referred to hiring manager for review – Your application has been delivered to the hiring manager.  You may or may not be called for an interview.

Position filled – Someone has been selected for the position.

Position canceled – The agency has decided not to fill the position.

The State of Louisiana only accepts online applications. Paper applications will not be accepted. Computer access is available at your local library, at local Louisiana Workforce Commission Business Career Solutions Centers (Download PDF reader), and at our Baton Rouge Information and Testing Office at 5825 Florida Boulevard, Room 1070, Baton Rouge, LA 70806.  If you require an ADA accommodation, please contact our office at (225) 925-1911 or Toll Free: (866) 783-5462 during business hours for additional assistance.  

(Please note:  Libraries and LWC centers cannot provide in-depth assistance to applicants with limited computer skills; therefore, we suggest that such applicants have someone with computer proficiency accompany them to these facilities to assist with the computer application process.  Also, no State Civil Service employees are housed at the libraries or LWC centers to answer specific questions about the hiring process.  Such questions should be directed to our Baton Rouge Information and Testing Office at the phone numbers above or by visiting the office on Florida Blvd. where assistance is available.  Information is also provided on our job seeker website at www.jobs.la.gov).

For additional information about this vacancy contact:
Janet Gordon, HR Director B
Florida Parishes Human Services Authority
835 Pride Drive, Suite B
Hammond, Louisiana  70401
Phone: 985-543-4333Qualifications

MINIMUM QUALIFICATIONS:
A baccalaureate degree plus four years of professional level experience in information technology or electrical engineering.
SUBSTITUTIONS:
Two years of experience or training in information technology or electronic technician work will substitute for the baccalaureate degree.

Candidates without a baccalaureate degree may combine experience or training in information technology or electronic technician work and college credit to substitute for the baccalaureate degree as follows:

A maximum of 90 semester hours may be combined with experience or training in information technology or electronic technician work to substitute for the baccalaureate degree.

30 to 59 semester hours credit will substitute for six months of experience or training in information technology or electronic technician work towards the baccalaureate degree.

60 to 89 semester hours credit will substitute for one year of experience or training in information technology or electronic technician work towards the baccalaureate degree.

90 or more semester hours credit will substitute for one year and six months of experience or training in information technology or electronic technician work towards the baccalaureate degree.

College credit earned without obtaining a baccalaureate degree may be substituted for a maximum of one year and six months of experience or training in information technology or electronic technician work towards the baccalaureate degree. Candidates with 90 or more semester hours of credit, but without a degree, must also have at least six months of experience or training in information technology or electronic technician work to substitute for the baccalaureate degree.

An associate degree in computer science will substitute for the baccalaureate degree.

A baccalaureate degree with twenty-four semester hours in computer science, management information systems (MIS), quantitative business analysis–computer science, electrical engineering, information systems and decision sciences, computer engineering, telecommunications, or computer information systems will substitute for one year of the required experience.
A master’s degree in the above fields will substitute for one year of the required experience.
Specialized degrees will substitute for a maximum of one year of the required experience.
NOTE:
Any college hours or degree must be from a school accredited by one of the following regional accrediting bodies: the Middle States Commission on Higher Education; the New England Association of Schools and Colleges; the Higher Learning Commission; the Northwest Commission on Colleges and Universities; the Southern Association of Colleges and Schools; and the Western Association of Schools and Colleges.

MINIMUM QUALIFICATIONS:
A baccalaureate degree plus four years of professional level experience in information technology or electrical engineering.

SUBSTITUTIONS:
Two years of experience or training in information technology or electronic technician work will substitute for the baccalaureate degree.

Candidates without a baccalaureate degree may combine experience or training in information technology or electronic technician work and college credit to substitute for the baccalaureate degree as follows:

A maximum of 90 semester hours may be combined with experience or training in information technology or electronic technician work to substitute for the baccalaureate degree.

30 to 59 semester hours credit will substitute for six months of experience or training in information technology or electronic technician work towards the baccalaureate degree.
60 to 89 semester hours credit will substitute for one year of experience or training in information technology or electronic technician work towards the baccalaureate degree.
90 or more semester hours credit will substitute for one year and six months of experience or training in information technology or electronic technician work towards the baccalaureate degree.

College credit earned without obtaining a baccalaureate degree may be substituted for a maximum of one year and six months of experience or training in information technology or electronic technician work towards the baccalaureate degree. Candidates with 90 or more semester hours of credit, but without a degree, must also have at least six months of experience or training in information technology or electronic technician work to substitute for the baccalaureate degree.

An associate degree in computer science will substitute for the baccalaureate degree.

Verifiable experience in computer systems programming; or in systems, database, or network enterprise system support (hardware or software level) at a Louisiana State agency as a student worker enrolled in any baccalaureate degree program will substitute for a maximum of one year of the required professional experience on a month for month basis. A letter from the agency employing the former student must be submitted with the application and retained as part of the former student worker’s record.

A baccalaureate degree with twenty-four semester hours in computer science, management information systems (MIS),  quantitative business analysis–computer science, electrical engineering, information systems and decision sciences, computer engineering, telecommunications, or computer information systems will substitute for one year of the required experience.

A master’s degree in the above fields will substitute for one year of the required experience.

Specialized degrees will substitute for a maximum of one year of the required experience.

NOTE:
Any college hours or degree must be from a school accredited by one of the following regional accrediting bodies: the Middle States Commission on Higher Education; the New England Association of Schools and Colleges; the Higher Learning Commission; the Northwest Commission on Colleges and Universities; the Southern Association of Colleges and Schools; and the Western Association of Schools and Colleges.Job Concepts

Function of Work:
To supervise and direct the personnel and activities of a technical support section of an information technology division having department-wide impact.

Level of Work:
Supervisor.

Supervision Received:
Broad direction from higher-level Information Technology personnel.

Supervision Exercised:
Direct line over Information Technology Technical Support Specialists.

Location of Work:
May be used by all state agencies. (Individual departments may restrict assignment of these duties to the Information Technology section.)

Job Distinctions:
Differs from lower level technical support jobs by the presence of responsibility for direct line supervision of subordinate personnel.

Differs from Information Technology Technical Support Manager by absence of responsibility for managing all systems software, database and computer network activities of a data center.

Examples of Work

Supervises and directs a technical support section (e.g. software support, LAN/WAN support, enterprise network management, or data base management) by assigning work and priorities, arranging formal training for employees, approving/disapproving requests for leave, evaluating performance, and determining and enforcing standards.

Supervises the selection, acquisition, installation, modification, monitoring, and management of computer systems and/or hardware for system, database and/or (LAN/WAN/enterprise) system support.

Determines and writes standards and procedures for technical functions such as the computer environment, security, data base administration, storage management, transaction processing, performance and tuning, backup and recovery, network management, and end-user support.

Directs and oversees selection, acquisition, installation, implementation, modification, monitoring, and problem determination, resolution of vendor-supplied software and/or hardware; development of internal software systems; evaluation of user requests for technical assistance and modifications of software and hardware systems.

Directs and plans appropriate training in the usage and efficiency of installed software and hardware.

Meets and consults frequently with users, vendors and administrators to discuss and resolve goals and strategies, issues and/or problems of a complex nature.

Provides technical expertise to subordinates in the analysis, design, acquisition, and implementation of operating systems, communications and application software packages.

Consults and advises management in determining needs and developing strategy and implementation schedules.

Directs and conducts evaluation of hardware and software components which impact the delivery of services to the entire user community.

Attends and participates in professional conferences and seminars.

 

The post IT Technology Technical Support Supervisor appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Information Technology Specialist (Network Infrastructure)

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans Court Services and Offender Supervision Agency for DC – Washington, DC $94,796 – $123,234 a year – Full-time, Part-time Duties Summary The position is located in the Office of Information Technology (OIT), Court Services and Offender Supervision Agency (CSOSA) for the District of Columbia. Working in […] View full post on AmIHackerProof.com | Can You Be Hacked?

Information Technology Specialist (Systems Analysis)

more information on sonyhack from leading cyber security expertsSource: National Cyber Security – Produced By Gregory Evans Department of the Treasury – New Carrollton, MD $119,285 – $161,900 a year – Full-time, Part-time The U.S. Department of the Treasury has a distinguished history dating back to the founding of our nation. As the steward of U.S. economic and financial systems, Treasury is a […] View full post on AmIHackerProof.com | Can You Be Hacked?

Hack to the future: HopHacks challenges students to solve problems using technology

Source: National Cyber Security – Produced By Gregory Evans

In rooms around Hodson Hall on Saturday night, clusters of students tapped away at their laptops amid a scattering of snack bags, soda cans, book bags, and belongings. Some took time out from their teamwork to study for a test. A few napped using balled up sweatshirts as pillows. It…

The post Hack to the future: HopHacks challenges students to solve problems using technology appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Sophisticated criminals victimize millions with technology, online scams

Source: National Cyber Security – Produced By Gregory Evans

The KMBZ Cover Story for Thursday is “When Hackers Hit Home,” all about criminals who use technology to steal peoples’ identities and property. One victim in the Kansas City Metro is Scott, who found that he and his family were victimized when he tried to file his taxes. “When we…

The post Sophisticated criminals victimize millions with technology, online scams appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Information Technology (IT) Manager

Source: National Cyber Security – Produced By Gregory Evans

The Information Technology Manager’s role is to ensure the streamlined operation of all IT department functions in alignment with organizational business objectives. The IT manager will plan, coordinate, direct and design IT-related activities of the organization, as well as provide administrative direction and support for daily operational activities of the…

The post Information Technology (IT) Manager appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Manager, Information Technology

Source: National Cyber Security – Produced By Gregory Evans

Great vacations begin with great employees! Combine your experience and sense of adventure by joining our exciting team of employees in Miramar, Florida.  Royal Caribbean Cruises Ltd. is pleased to offer a competitive compensation & benefits package, and excellent career development opportunities, each offering unique ways to explore the world. …

The post Manager, Information Technology appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

Changing Technology Leads Evolving Cybersecurity Strategy

Source: National Cyber Security – Produced By Gregory Evans

Changing Technology Leads Evolving Cybersecurity Strategy

Dr. Jacob Shively, assistant professor of government at the University of West Florida, recently received a GROW Institute grant from the UWF Office of Research and Sponsored Programs to begin to look at the implications of technology and security policy. “My larger area of interest is national security and foreign…

The post Changing Technology Leads Evolving Cybersecurity Strategy appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures

How Will Innovative Technology Improve Our Cybersecurity Defenses?

Source: National Cyber Security – Produced By Gregory Evans

How Will Innovative Technology Improve Our Cybersecurity Defenses?

One consistent theme throughout Cybertech Fairfax 2017, which took place on Tuesday, June 13, was the critical need for innovative technology that safeguards against cyber intrusion. However, cybersecurity experts warn that as information technology (IT) improves, human interaction will continue to be a primary point of cybersecurity vulnerability unless leaders…

The post How Will Innovative Technology Improve Our Cybersecurity Defenses? appeared first on National Cyber Security Ventures.

View full post on National Cyber Security Ventures