Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and ...
read moreFostering collaboration and cross-functional partnerships to help spread awareness and drive the implementation of a strong security risk management program in order to mitigate risks faced by our org...
read moreFacilitate the continued improvement in information security risk management and culture across the firm, through continual refinement and implementation of the Information Security Framework. Senior ...
read moreActs as an Information Security subject-matter-expert to support and assist with providing guidance to Senior Management on information and cyber security issues. Develop and manage information and cy...
read moreDevelop and manage information and cyber security related activities and projects in a key leadership role as you will be the second most senior individual in the information security risk group. Act ...
read moreFacilitate the continued improvement in information security risk management and culture across the firm, through continual refinement and implementation of the Information Security Framework. Senior ...
read moreDevelop and manage information and cyber security related activities and projects in a key leadership role as you will be the second most senior individual in the information security risk group. Act ...
read moreDevelop and manage information and cyber security related activities and projects in a key leadership role as you will be the second most senior individual in the information security risk group. Acts...
read moreInformation Technology Services (ITS) is recruiting for one (1) Senior IT Architect, to function as a Senior Information Security Architect, who will:. Identify probable system security problems or se...
read moreInformation Technology Services (ITS) is recruiting for one (1) Senior IT Architect, to function as a Senior Information Security Architect, who will:. Identify probable system security problems or se...
read moreRockefeller Capital Managements Technology department is seeking a Summer Analyst to join its Information Security team this summer. Engage senior leadership across the business to promote a risk cult...
read moreDiscover what you can do with technology at ASCAP!Job Description: Information Security Analyst (Application Security)We are looking for a motivated, detail-oriented individual with strong technical s...
read moreDiscover what you can do with technology at ASCAP!Job Description: Information Security Analyst (Application Security)We are looking for a motivated, detail-oriented individual with strong technical s...
read moreThe Senior Director of Information Security and Compliance develops and implements comprehensive strategies, policies, and procedures to identify and mitigate risks, ensure compliance with industry re...
read moreSpecifically in the areas of security architectures and associated technologies, security operation centers, security engineering, identity governance and administration/identity and access management...
read moreThe Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & B...
read moreThe Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & B...
read moreBachelor's Degree in Risk Mgmt, Information Security, Business, or related field; advanced degrees (e. Technology Control Management is looking for an Analyst of Governance focused on ensuring control...
read moreBachelor's Degree in Risk Mgmt, Information Security, Business, or related field; advanced degrees (e. Technology Control Management is looking for an Analyst of Governance focused on ensuring control...
read moreCenter 3 (19075), United States of America, McLean, VirginiaSenior Manager, Information Security Office (ISO) Assurance Team Lead. At least 7 years of experience performing cyber security risk assessm...
read moreCenter 3 (19075), United States of America, McLean, VirginiaSenior Manager, Information Security Office (ISO) Assurance Team Lead. Provide regular updates to executive leadership on the overall Inform...
read moreConduct thorough Cybersecurity, Business Continuity, Artificial Intelligence, Cloud Service Prover and Privacy assessments for Vendors, evaluating their information security policies, procedures, and ...
read moreThis is a full-time position for a Senior Information Security Analyst ("Security Analyst”) within the. Information Security team that participates in all aspects of information security. Bachelor's d...
read moreThis is a full-time position for a Senior Information Security Analyst ("Security Analyst”) within the. Information Security team that participates in all aspects of information security. Bachelor's d...
read moreWork closely with cross-functional teams, including senior business and legal stakeholders, to provide information security and cybersecurity strategy and guidance to support operations and new initia...
read moreWork closely with cross-functional teams, including senior business and legal stakeholders, to provide information security and cybersecurity strategy and guidance to support operations and new initia...
read moreThe Information Security Analyst is a wide-ranging, hands-on role encompassing the design, implementation, and maintenance of advanced cybersecurity technologies, performing in-depth security reviews ...
read moreThe Information Security Analyst is a wide-ranging, hands-on role encompassing the design, implementation, and maintenance of advanced cybersecurity technologies, performing in-depth security reviews ...
read moreReporting to the Associate Director or Director, Security GRC, the Senior Analyst will assist in the oversight of the company’s Security Governance, Risk, and Compliance program globally. Jazz Pharmac...
read moreReporting to the Associate Director or Director, Security GRC, the Senior Analyst will assist in the oversight of the company’s Security Governance, Risk, and Compliance program globally. Jazz Pharmac...
read moreThe Senior Information Security Analyst will have strong technical experience and a risk evaluation mindset in all areas of security operations including, event triage, incident response, vulnerabilit...
read moreBelieves diversity makes us stronger so we can reflect, connect and meet the diverse needs of our clients and employees around the world.Is committed to building a workplace where every employee is we...
read moreBelieves diversity makes us stronger so we can reflect, connect and meet the diverse needs of our clients and employees around the world.Is committed to building a workplace where every employee is we...
read moreYou have a BS in information security, information systems management, or computer science or equivalent experience in compliance, information security policy, information security operations and/or i...
read moreYou have a BS in information security, information systems management, or computer science or equivalent experience in compliance, information security policy, information security operations and/or i...
read moreThey are responsible for integrating and utilizing multiple security programs and resources, such as NDR/EDR (Network Detection and Response / Endpoint Detection and Response), SIEM (Security Informat...
read moreThey are responsible for integrating and utilizing multiple security programs and resources, such as NDR/EDR (Network Detection and Response / Endpoint Detection and Response), SIEM (Security Informat...
read more