A company is looking for a Revenue Operations Analyst to optimize sales and marketing tools, improve processes, and drive data-driven decision-making.
A company is looking for a Threat Research Analyst (Contract) to improve the capability to detect email-based threats.
Key ResponsibilitiesConduct security assessments and ensure compliance with security policies and regulationsCollaborate with technical teams to implement security controls and remediation effortsProv...
read moreKey Responsibilities:Investigate alerts and develop remediation plansConduct incident response activities in collaboration with business stakeholdersCompose incident analysis reports and recommend sec...
read moreKey ResponsibilitiesNavigate the IRS ATO process and prepare ATO documentationReview legacy BMF documentation and analyze reusable components for BMF ModCoordinate with security partners to ensure ATO...
read moreKey ResponsibilitiesProvides corporate security consulting support to concurrent projects and maintains documentationAnticipates and addresses security needs, providing guidance and interpreting secur...
read moreA company is looking for a Threat Research Analyst (Contract) to improve the capability to detect email-based threats.
Key ResponsibilitiesAssist in implementing technical security requirements and hardening standardsWork with engineering teams to maintain a secure architecture framework in Google CloudConduct vulnera...
read moreKey Responsibilities:Conduct near real-time security monitoring and identify Indicators of Compromise (IOCs)Monitor alert health and escalate critical alerts according to service level agreementsPerfo...
read moreA company is looking for a Revenue Operations Analyst to optimize sales and marketing tools, improve processes, and drive data-driven decision-making.
Key ResponsibilitiesDetect, monitor, analyze, and resolve security incidents, providing containment and recommendationsServe as a subject matter expert on security investigations and lead incident han...
read moreOversee classified security programs and provide expertise in all security functions in accordance with NISPOM and other applicable security regulations. Manage SAPs and associated DoD SAPF and assist...
read moreOversees classified security programs and provides expertise in all security functions in accordance with the National Industrial Security Program Operating Manual (NISPOM), and other applicable secur...
read moreThe Industrial Security Analyst interacts with internal and external customers or Government security officials in performance of security duties. Oversees classified security programs and provides ex...
read moreOversee classified security programs and provide expertise in all security functions in accordance with NISPOM and other applicable security regulations. Manage SAPs and associated DoD SAPF and assist...
read moreNetwork security, HIPAA, identity management, data security, group policies, anti-virus, anti-malware, web filter, network access control, encryption. Seeking Security Operations Analyst to join a com...
read moreNetwork security, HIPAA, identity management, data security, group policies, anti-virus, anti-malware, web filter, network access control, encryption. Seeking Security Operations Analyst to join a com...
read moreAs a Viasat security professional, you will be a valuable asset to our dynamic Security team. In this unique role, you have the opportunity to lead and mentor a small team of security professionals wh...
read moreKey ResponsibilitiesProactively prevent security incidents and respond to emerging threatsAnalyze network traffic and logs to identify anomalies and potential threatsCollaborate with team members and ...
read moreInvestigative Analyst (Criminal Analyst). Summary: This assignment is with the Homeland Security Investigations (HSI) San Diego Intelligence Division. Department of Homeland Security Headquarters.
Senior Technical Security Analyst. Senior Technical Security Analyst. Applying expertise to evaluate and counteract potential risks in our security landscape.
Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. In-depth knowledge of network and system security, security protocols, cryptography, and risk mana...
read moreRelevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. In-depth knowledge of network and system security, security protocols, cryptography, and risk mana...
read moreRelevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. In-depth knowledge of network and system security, security protocols, cryptography, and risk mana...
read moreBachelors and minimum of 8 years of Industrial Security or related experience or MS Degree and 6 years of Industrial Security or related. Bachelor's degree, Industrial Security Professional (ISP) cert...
read moreThe selected candidate will support the management and execution of security as it applies to program protection and Industrial Security oversight for our DoD Industrial Security Programs. Builds and ...
read moreThe selected candidate will support the management and execution of security as it applies to program protection and Industrial Security oversight for our DoD Industrial Security Programs. Builds and ...
read moreThe role of the Technical Security Analyst is to assist the Information Security Manager to ensure the confidentiality, integrity and availability of Stonegate Group information assets and systems. Su...
read moreThe role of the Technical Security Analyst is to assist the Information Security Manager to ensure the confidentiality, integrity and availability of Stonegate Group information assets and systems. Su...
read moreWe have an exciting opportunity for a Security Risk Analyst to join our expanding team. Under the direction of the Manager of Security Governance, Risk, and Compliance (SGRC) this position is responsi...
read moreUnder the direction of the Manager of Security Governance, Risk, and Compliance (SGRC), this position is responsible for the creation and maintenance of Security Governance documents, such as policies...
read moreEligibilities & qualifications.
This role entails contributing to the Project Staffing Plan to manage cross-utilization while ensuring security integrity, and drafting the Transition-In and Transition-Out Plans, addressing security ...
read moreSenior Information Security Analysts serve as a leader on the Neighborhood Healthcare cybersecurity team and in the IT department supporting initiatives that protect the confidentiality, integrity, an...
read moreSenior Information Security Analysts serve as a leader on the Neighborhood Healthcare cybersecurity team and in the IT department supporting initiatives that protect the confidentiality, integrity, an...
read moreLead security investigations based on inquiries from other organization within security, legal, Customer Service or Public Relations. IT security research and security operation including various frau...
read moreUnder the direction of the Manager, Information Security Operations, the Engineer III –Security Analyst will use subject matter expertise to give guidance, best practices, and support to business and ...
read moreImplements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities.
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security framew...
read moreDrives the implementation and enhancement of security processes across the organization to reduce information security risk, address threat and vulnerabilities to information assets, monitor complianc...
read more