As a Senior Security Analyst , you'll directly shape and strengthen our detection and response capabilities, help mature our security operations, and ultimately protect the organization from evolving ...
read moreINFORMATION SECURITY ARCHITECTURE : Design and architect enterprise security. IMPLEMENT SECURITY MEASURES : Design security architecture elements to mitigate threats. Monitor the security of digital i...
read moreThe QA Analyst will be responsible for planning, designing, and executing test plans that address non-functional testing areas such as load, stress, volume, security, penetration, and system performan...
read moreTechnical subject matter expertise in Endpoint Security specifically with a focus on the following:* Endpoint protection platforms (EPP) and endpoint detection and response (EDR)* Ransomware preventio...
read moreSenior Cyber Security Incident Response Analyst. Senior Cyber Security Incident Response Analyst. The FIS Security Incident Response Team (FSIRT) handles rapid response to major security threats, with...
read moreSenior Cyber Security Incident Response Analyst. Senior Cyber Security Incident Response Analyst. The FIS Security Incident Response Team (FSIRT) handles rapid response to major security threats, with...
read moreIMPLEMENT SECURITY MEASURES : Design security architecture elements to mitigate threats. INFORMATION SECURITY ARCHITECTURE : Design and architect enterprise security. Monitor the security of digital i...
read moreTechnical subject matter expertise in Endpoint Security specifically with a focus on the following:* Endpoint protection platforms (EPP) and endpoint detection and response (EDR)* Ransomware preventio...
read moreAs a Senior Security Analyst , you'll directly shape and strengthen our detection and response capabilities, help mature our security operations, and ultimately protect the organization from evolving ...
read moreStrong technical understanding of cybersecurity fundamentals at the network, protocol, and host levels. Offensive security experience - conducting red team operations and/or penetration tests.
Additionally, the role involves establishing and maintaining security manuals, working with control owners to remediate and track deficiencies, and assisting in the enhancement of the information secu...
read moreCollaborates closely with Research Information Security Specialist and Enterprise Digital Services (EDS) IT Security team to develop and implement security measures and controls for research platforms...
read moreThe SAP GRC Analyst supports SAP GRC Access and Process Control, as well as S/4HANA security management in a diverse SAP environment. Generate reports and conduct audits for SAP security & ITGC contro...
read moreThe SAP GRC Analyst supports SAP GRC Access and Process Control, as well as S/4HANA security management in a diverse SAP environment. Generate reports and conduct audits for SAP security & ITGC contro...
read moreHRIS Analyst (Integrations + Security). Workday configuration experience with strong knowledge of Workday HCM, business processes, security, and integrations. After 3 years on Workday, we have a solid...
read moreHRIS Analyst (Integrations + Security). After 3 years on Workday, we have a solid foundation—now comes the exciting part of enhancing our processes and introducing new functionality! You will work on ...
read moreYou will be part of a security-minded team that believes in progress over perfection and where security culture and mindset is key. Deep experience in triaging, investigating, and remediating security...
read moreYou will be part of a security-minded team that believes in progress over perfection and where security culture and mindset is key. You’ll serve as a point-of-contact for incidents and collaborate wit...
read moreThe AVP, Physical Security/Fraud Intelligence Analyst is responsible for conducting in-depth research and analysis to detect, identify, and triage information related to threats and risks to Synchrony...
read moreSolid knowledge of adjacent technologies to keep endpoints secure, including Secure Web Gateways (SWG), Security Service Edge (SSE), and email security. Gartner Analysts help clients in different indu...
read moreYou will be part of a security-minded team that believes in progress over perfection and where security culture and mindset is key. Deep experience in triaging, investigating, and remediating security...
read moreYou will be part of a security-minded team that believes in progress over perfection and where security culture and mindset is key. Proven ability to proactively collaborate with cross-functional team...
read moreSolid knowledge of adjacent technologies to keep endpoints secure, including Secure Web Gateways (SWG), Security Service Edge (SSE), and email security. Senior Director - Technical SME – Endpoint Secu...
read moreThe AVP, Physical Security/Fraud Intelligence Analyst is responsible for conducting in-depth research and analysis to detect, identify, and triage information related to threats and risks to Synchrony...
read moreThe SAP Application Security Analyst is responsible for supporting SAP Application security, GRC, and Identity & Access Management in a diverse SAP Enterprise Application environment. Microsoft Azure,...
read moreThe SAP Application Security Analyst is responsible for supporting SAP Application security, GRC, and Identity & Access Management in a diverse SAP Enterprise Application environment. Microsoft Azure,...
read moreSolid knowledge of adjacent technologies to keep endpoints secure, including Secure Web Gateways (SWG), Security Service Edge (SSE), and email security. Gartner Analysts help clients in different indu...
read moreSolid knowledge of adjacent technologies to keep endpoints secure, including Secure Web Gateways (SWG), Security Service Edge (SSE), and email security. Gartner Analysts help clients in different indu...
read moreAct as an Information Security subject-matter-expert to support and assist with providing guidance to Senior Management on information and cyber security issues. Information Security Risk Governance A...
read moreExperience conducting security posture assessments, process reviews, reading security test reports, and performing security awareness training. Planning and execution of department initiatives includi...
read moreExperience conducting security posture assessments, process reviews, reading security test reports, and performing security awareness training. Planning and execution of department initiatives includi...
read moreExperience as a security/SOC analyst or comparable role in security administration preferred?. The GSOC Analyst executes the various core functions of the GSOC, including Incident Recognition/Escalati...
read moreExperience as a security/SOC analyst or comparable role in security administration preferred?. The GSOC Analyst executes the various core functions of the GSOC, including Incident Recognition/Escalati...
read moreTop Three Skills: Information Security Compliance experience - Sox/Audit Experience in Pharmaceutical and Cloud-based software controls OT or Make or Application Security Assessment experience Is this...
read moreThe Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & B...
read moreWorking experience in information security, especially on a Computer/Security Incident Response Team (C/SIRT), Computer Emergency Response Team (CERT), Computer Security Incident Response Center (CSIR...
read moreReporting to the Associate Director or Director, Security GRC, the Senior Analyst will assist in the oversight of the company’s Security Governance, Risk, and Compliance program globally. Basic unders...
read moreThe SOC (Security Operations Center) Security Analyst will be assigned to furthering the security mission within the client’s Regional Security Operations Center (RSOC) and Global Security Operations ...
read moreBachelor's degree in Computer Science, Information Systems, Cyber Security, Math or Engineering and a minimum of 4 years of experience in Information Security; In lieu of a degree, 8 years of experien...
read moreThey are responsible for integrating and utilizing multiple security programs and resources, such as NDR/EDR (Network Detection and Response / Endpoint Detection and Response), SIEM (Security Informat...
read more