The Senior Vice President, Information Security Technical Senior Lead Analyst(US Personal Banking - Digital and Partnership) is an intermediate level position responsible for driving efforts to preven...
read moreKnowledge of cyber security and information security controls best practices with supporting qualifications where possible - such as Security+, Certified Ethical Hacker (CEH), Certified Information Sy...
read moreThe analyst will closely collaborate with business areas on defining and maintaining access for their systems and work across Information Security to ensure execution of those operational processes. T...
read moreReview security clauses in contracts; advise on Instabase’s security, compliance, and privacy posture and ensure contracts accurately reflect our measures Assist where applicable in compliance auditsA...
read moreSecurity team of a local hedge fund. Identify and respond to security incidents, malware, phishing, and intrusion attempts. Investigate security breaches and document their impact.
Must have in-depth knowledge of network security best practices and various tools (Cisco VPN, Palo Alto VPN, Cisco ACS, Cisco ISE, NGFW, Solarwinds, IP Management tools, WireShark,. In a very hands-on...
read moreTo achieve this, we're looking for a Cyber Security GRC Analyst to join #TeamMVP. Provide third party oversight including review of contracts, Business Associate Agreements, Information Security Quest...
read moreSetting up security reference master. Setting up and maintaining the Security Reference Master (SRM) data for all the client's securities of interest.
The analyst will closely collaborate with business areas on defining and maintaining access for their systems and work across Information Security to ensure execution of those operational processes. T...
read moreReporting to the Director of Information Security, the Lead Security Analyst (Managing Assistant Director 1) will play a critical role in protecting the University's digital assets by focusing on proa...
read moreInternational Bank is seeking an Information Security Analyst who will perform duties related to 3rd Party Risk Management, and Operational Risk Management. This position will assist the CISO to manag...
read moreThe scope of this position includes incident response of cybersecurity incident, identity management, technical protection measures, monitoring tools, 3rd party providers/partners, and employee securi...
read moreThe Security Operations Center Analyst's primary role is for internal alarm monitoring, but is also responsible for monitoring, researching, reviewing, and analyzing physical security data sources for...
read moreRockefeller Capital Managements Technology department is seeking a Summer Analyst to join its Information Security team this summer. Proactively identify potential security issues and make recommendat...
read moreThe successful candidate will play a crucial role in testing the security program, and identifying potential gaps in people, processes, and technology. Security certifications required : OSCP, OSCE, O...
read moreThe position reports to the Epic Security Director but the Security Analyst may also be called upon to help with other security related tasks, so a working knowledge of both Epic security and general ...
read moreStrong Technical Fundamentals - Understanding of network security, network hardware configuration, network protocols , security standards, cyber security forensics tools and methodologies. We are cond...
read moreThe Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & B...
read moreAbacus Technology is seeking a Cyber Security Analyst to assist the government with policy management for security at Picatinny Arsenal. Provide weekly reports for cyber security training and certific...
read moreConsult on or participate in moderately complex initiatives and deliverables within Information Security Analysis and contribute to large-scale planning related to Information Security Analysis delive...
read more