Interested in finding more jobs in Woodland Hills, CA? Click Here to create a Climber profile today!



The California Endowment Work Values

Interested in finding out if you are the type of person this company is looking for? Create an account and take our patented DNA assessment now to see how you compare.


Daily Duties at The California Endowment:

Responsible for all California Endowment server and desktop technologies, security, hardware, software, and technical training in a Windows Server 2003 SP1 Active Directory and Exchange Server 2003 SP1 environment.


What they like about The California Endowment:

You give high priority to hiring firms with prestige. Market reputation and prestige of a firm may be determined through on-line research, and conversations with individuals working in your target industry. Note that firms "in the public eye" receive a great deal more critical publicity and attention than those operating with more anonymity. So as you assess your employment opportunities, be sure to seek out the positive aspects of the firm's reputation in addition to noting negative publicity the company may have received.



Skills

Deploy and track enterprise-wide security controls to ensure the confidentiality of data, Develop and maintain a robust security strategy with solid security policies, protocols, and procedures across enterprise security architecture, Direct or perform special security audits and/or vulnerability assessments as required, Manage cyber investigations and supports the implementation of IP security tools, development of cyber security protocols, maintenance/advancement of the forensic laboratory, Coordinate information and intelligence sharing across the companys cyber response practice, Interact successfully with all levels of the Company and functions as the internal expert on investigative techniques, Develop comprehensive Incident Response Policy and Procedures allowing prompt responses to security incidents and appropriate communications with key stakeholders, Identify & remediate vulnerabilities, implement security tools, improve user awareness & training, and respond to security incidents, Develop and maintain security infrastructure for the defense, detection and response to cyber threats, Develop and implement security policies, procedures, and operating practices, Design and implement automated user provisioning and de-provisioning (Identity Management) to eliminate security gap between Human Resources and IT, Develop and implement security awareness training programs

Information about The California Endowment


Company Rank: Not Available

Average length of employment : 5 years

Average salary of employees: $144,200

These are some of the questions we asked our climbers about their experiences with The California Endowment:

05|
Were your performance expectations clearly communicated?

0.0

Were you recognized for meeting or exceeding expectations?

0.0

Did you feel like your personal contribution was important?

0.0

Was your career path clearly outlined and discussed?

0.0


03|
I would recommend this as a place of employment.
0.0
I believe in the purpose of this organization.
0.0
I would work for this organization again.
0.0
I feel employees are fairly compensated.
0.0


Climbers who worked at The California Endowment had these interests:

Books
SPAM Nation Spam Nation delves deeper than perhaps any other publication into the workings of the cybercrime underground, giving readers unprecedented access to a well-hidden world that few outside of these communities have seen up close.
Future Crimes: Inside the Digital Underground and the Battle for Our Connected World Technological advances have benefited our world in immeasurable ways, but there is an ominous flip side: our technology can be turned against us. And just over the horizon is a tidal wave of scientific progress that will leave our heads spinning—from im
Countdown to Zero Day: Stuxnet and the Launch of the World's First Digital Weapon Top cybersecurity journalist Kim Zetter tells the story behind the virus that sabotaged Iran’s nuclear efforts and shows how its existence has ushered in a new age of warfare—one in which a digital attack can have the same destructive capability as a


Back