Knowledge of cyber security and information security controls best practices with supporting qualifications where possible - such as Security+, Certified Ethical Hacker (CEH), Certified Information Sy...
read moreThe analyst will closely collaborate with business areas on defining and maintaining access for their systems and work across Information Security to ensure execution of those operational processes. T...
read moreWells Fargo is seeking a Senior Lead Information Security Analyst in Technology as part of Cybersecurity. The Cybersecurity champion will report directly to the Business Information Security Officer (...
read moreReview security clauses in contracts; advise on Instabase’s security, compliance, and privacy posture and ensure contracts accurately reflect our measures Assist where applicable in compliance auditsA...
read moreSecurity team of a local hedge fund. Identify and respond to security incidents, malware, phishing, and intrusion attempts. Investigate security breaches and document their impact.
To achieve this, we're looking for a Cyber Security GRC Analyst to join #TeamMVP. Create Cybersecurity dashboard and presentations for Board Risk and Compliance Committee. Manage and maintain IT secur...
read moreTo achieve this, we're looking for a Cyber Security GRC Analyst to join #TeamMVP. Manage and maintain IT security Risk Register. Provide third party oversight including review of contracts, Business A...
read moreSetting up security reference master. Setting up and maintaining the Security Reference Master (SRM) data for all the client's securities of interest.
The analyst will closely collaborate with business areas on defining and maintaining access for their systems and work across Information Security to ensure execution of those operational processes. T...
read moreReporting to the Director of Information Security, the Lead Security Analyst (Managing Assistant Director 1) will play a critical role in protecting the University's digital assets by focusing on proa...
read moreInternational Bank is seeking an Information Security Analyst who will perform duties related to 3rd Party Risk Management, and Operational Risk Management. Bachelor’s degree in Information Security, ...
read moreIn-depth knowledge of security event management, network security monitoring, investigating common types of attacks, network packet analysis, log collection and analysis, and reviewing security events...
read moreRockefeller Capital Managements Technology department is seeking a Summer Analyst to join its Information Security team this summer. Analysts should have an interest in the financial services industry...
read moreThe position reports to the Epic Security Director but the Security Analyst may also be called upon to help with other security related tasks, so a working knowledge of both Epic security and general ...
read moreWorks closely with other members of the Information Security and various other organizations in a collaborative and goal-oriented manner. Knowledge and conceptual understanding of security controls (I...
read moreThe successful candidate will play a crucial role in testing the security program, and identifying potential gaps in people, processes, and technology. Security certifications required : OSCP, OSCE, O...
read moreThe Senior Applications Analyst - Application Security Operations (Security LPL Developer). Experience in other application security technologies, such as web application firewalls or endpoint securit...
read moreThe Information Security Analyst (“the Analyst”) will respond to daily security and operational system alerts and perform active threat monitoring and hunting for advanced threats. The Analyst will be...
read moreUnder the direction of the Executive Director Infrastructure, the Cyber Security Analyst Level II will assist with implementing cybersecurity polices, standards, directives, and guidelines that draws ...
read moreSecurity Operations Analyst performs advanced threat analysis, collaborates with internal IT teams and MSSP for security monitoring response, improves correlation and monitoring of security events, an...
read more