Vice President, Lead Information Security Analysis: This position is responsible in driving the organization's enterprise security strategy across cloud environments, multi-factor authentication (MFA)...
read moreSecurity certifications such as CCSP, CISSP, AWS Certified, Azure Security Engineering, GCSA, CISM. Vice President, Lead Information Security Analysis: This position is responsible in driving the orga...
read moreAre you an experienced Project Manager/Business Analyst with a desire to excel? If so, then Talent Software Services may have the job for you! Our client is seeking an experienced Project Manager/Busi...
read moreThis position will report to the Governance Director and be responsible for supporting the Information Technology and Cyber Security organizations in matters related to issues management, audit, compl...
read moreThis position will report to the Governance Director and be responsible for supporting the Information Technology and Cyber Security organizations in matters related to issues management, audit, compl...
read moreThis analyst will collaborate with other members of the team to help simplify, streamline, automate and enhance the overall security capabilities of Shutterfly's Security Operations. Shutterfly is loo...
read moreThis analyst will collaborate with other members of the team to help simplify, streamline, automate and enhance the overall security capabilities of Shutterfly's Security Operations. Shutterfly is loo...
read moreSecurity Analyst serves as a member of the Security Governance, Risk, and Compliance team to maintain the confidentiality, integrity and availability of sensitive company information. Design and devel...
read moreSecurity Analyst serves as a member of the Security Governance, Risk, and Compliance team to maintain the confidentiality, integrity and availability of sensitive company information. This role is exp...
read moreAs a Post Market/Data Analyst you will:.
High School / GED and 4 years of Business Analyst training/certification and Business Analyst experience. OR An Associate's degree and 2 years' experience as a business analyst or Bachelor's degree. K...
read moreHigh School / GED and 4 years of Business Analyst training/certification and Business Analyst experience. OR An Associate's degree and 2 years' experience as a business analyst or Bachelor's degree. K...
read moreAs a Post Market/Data Analyst you will:.
Strengthen the companys security posture by working with NIST and CIS controls, leading efforts in the security awareness training program and ensuring end-user compliance with security best practices...
read moreThe Data Governance Analyst is responsible for ensuring the accuracy, consistency, and security of organizational data assets. The analyst supports strategic decision-making through collaboration with...
read moreThe role of the Senior Business Systems Analyst is to act as a functional Finance analyst and technical resource to provide ERP software solutions that meet the technical requirements of Lorams intern...
read moreThe Security/GRC Analyst is a Consulting and Assessing roles. This position requires a thorough understanding of networking, systems, and the CMMC (Cybersecurity Maturity Model Certification) complian...
read moreThe Security/GRC Analyst is a Consulting and Assessing roles. As a consultant, you will schedule system security interviews with various stakeholders and work with Procellis Technology's clients to id...
read moreWith compliance being a central tenant of the cybersecurity discipline, the Cyber Security Operations Analyst will gain mastery of PCI and GDPR. The Cyber Security Operations Analyst will implement th...
read moreWith compliance being a central tenant of the cybersecurity discipline, the Cyber Security Operations Analyst will gain mastery of PCI and GDPR. The expectation of the Cyber Security Operations Analys...
read moreLeads monthly cybersecurity team in discussion and recommendations around the following:Effective use of cybersecurity tools features and functionalityBest practice configuration of cybersecurity tool...
read moreLeads monthly cybersecurity team in discussion and recommendations around the following:Effective use of cybersecurity tools features and functionalityBest practice configuration of cybersecurity tool...
read moreEnsure they meet security requirements. Manage security technologies like firewalls and IDS/IPS. Recommend and implement new security measures to enhance defenses.
Ensure they meet security requirements. Manage security technologies like firewalls and IDS/IPS. Recommend and implement new security measures to enhance defenses.
Perform other duties and responsibilities as required, assigned, or requested Demonstrate excellent time management skills and the ability to prioritize work in a highly dynamic environment Required (...
read morePerform other duties and responsibilities as required, assigned, or requested Demonstrate excellent time management skills and the ability to prioritize work in a highly dynamic environment Required (...
read moreAnalyzes security logs to identify threat events; triage and respond accordingly to security incidents following internal security protocols. The analyst takes part in designing and implementing secur...
read moreAnalyzes security logs to identify threat events; triage and respond accordingly to security incidents following internal security protocols. The analyst takes part in designing and implementing secur...
read moreBN USD WE’RE PRESENT IN 66 COUNTRIES OVER 1,400 ACTIVE GLOBAL CLIENTS Role : IT security Analyst Location : Remote, USA Job Description: Assists with the development and execution of Information Risk ...
read moreBN USD WE’RE PRESENT IN 66 COUNTRIES OVER 1,400 ACTIVE GLOBAL CLIENTS Role : IT security Analyst Location : Remote, USA Job Description: Assists with the development and execution of Information Risk ...
read moreThe Senior Information Security Risk Analyst leads enterprise information security training and awareness activities, including secure development training, compliance & ethics training, and phishing ...
read moreThe Senior Information Security Risk Analyst leads enterprise information security training and awareness activities, including secure development training, compliance & ethics training, and phishing ...
read moreAs a Governance Support Specialist, you will play a pivotal role in supporting our Information Technology and Cyber Security teams in matters concerning audit, compliance, and risk remediation. Collab...
read moreIT GRC, information security, and/or audit experience. Certification (CISM, CISA, CySA+, Security+ or CRISC). As a Governance Support Specialist, you will play a pivotal role in supporting our Informa...
read moreThe Triage Security Analyst Intern (TSA) is a first level Security Operations Center role, supporting our security services globally. Security basics with a demonstrated passion for networking and cyb...
read moreThis role works closely with the Director of IT Security Services and the Lead Security Analyst to build and refine the overall security posture for the firm. This role is a hands-on position who supp...
read moreThis role is a hands-on position who supports the Lead and the Security Analysts by assisting in the creation and implementation of best practice documents, security architecture drawings, subject mat...
read moreThe Triage Security Analyst Intern (TSA) is a first level Security Operations Center role, supporting our security services globally. Understand IT infrastructure and networking to be able to identify...
read moreThe Security Analyst is a front-line Operations Center role, supporting our security services around the world. The SA is an internal triage analyst who assesses inbound security data and communicatio...
read moreThe Security Analyst is a front-line Operations Center role, supporting our security services around the world. The SA is an internal triage analyst who assesses inbound security data and communicatio...
read more