The information security analyst will be required to effectively execute security processes enabled by security technologies and services. The information security analyst plays an integral role in carrying out the organization's security strategy, architecture, and practices. The information securi...
Reporting directly to the Director, Information Security, the Security Analyst specialized in Risk and Compliance to join our dynamic team. In this role, you will be responsible for ensuring that our organization complies with relevant cybersecurity regulations, standards, and best practices. You wi...
Job Title: Cyber Security Analyst II (Hybrid) Location: Frisco, TX or Charlotte, NC, or Denver, CO or Roseland, NJ, then Woodbridge, NJ Job Description: The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to...
Responsible for ensuring the security of the City of Denton's information systems and infrastructure through the development and implementation of security policies and procedures, conducting risk assessments, and monitoring for security threats and vulnerabilities. Monitor for security threats and ...
As a member of the Global Cyber Security Correlations Team, the Analyst 2, Security is an experienced professional responsible for analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for analyzing system ...
Job description Infosys is seeking a UVM Application Security Analyst. ...
CANDIDATE SKILLS AND QUALIFICATIONS.Candidates that do not meet or exceed the .Evaluate and review existing SIEM platform capabilities to determine current system state.Aspects include benchmarking of in use hardware, storage and virtualization features, evaluating overall system performance, invest...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
As a member of the Global Cyber Security Monitoring Team, the Analyst 3, Security is a highly experienced professional responsible for correlation, analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for ...
The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
Financial Crimes Compliance Analyst. Opportunities available for Analysts and Senior Analysts. Guidehouse is seeking experienced personnel to support oversight of the quality of service delivery for projects in which Guidehouse conducts financial crime and regulatory compliance related reviews and i...
Title: IT Security F5 Engineer. Ensure compliance with security policies, procedures, and regulations, and identify and manage security risks. Knowledge of security frameworks, such as NIST Cybersecurity Framework. Must haves Palo Alto X-series Firewalls; F5 Solutions; Perimeter Security; Intrusion ...
Maximus is seeking a SOC Analyst Tier I to support a federal Homeland Security customer in Denton, Texas. Experience in a SOC environment. ...
The responsibilities of the Analyst will include, but are not limited to:. Quality Control / Quality Assurance experience supporting TMS alerts, and / or financial regulatory compliance. Ability to conduct detailed investigations using vendors and open sources to remediate compliance alerts and to i...
The Business Data Analyst will play a pivotal role in enhancing operational efficiency, streamlining processes, and supporting data-driven decision making. Work closely with management to prioritize business and information needs. ...
Role: Business Data Analyst with Strong Snowflake ( 4+ yrs Mortgage or Financial experience is a Must ). ...
Trailer Security Inventory Specialist. Trailer Security Inventory Specialist. ...
Healthcare Systems Business Analyst. Help coordinate a business analyst teams duties and activities on IT projects and nurture newer team members by providing guidance and support. Business Analyst position with 3+ years of Medicaid experience preferred. Be a knowledgeable bridge between clients, pr...
About this position: • Department: Operations • Location (City/State): Austin, TX • Employment Type: Part Time About us: Security Industry Specialists, Inc. About the role: Candidates in the position provide onsite security services in a (campus) environment In this role, your responsibilities will ...
Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, Computer Security, or Information Technology – or equivalent applied experience. This includes participating in working groups, design reviews, and formal Risk Management Framework (RMF) and National Security Agency (NSA)...
Business Analyst, Product Manager, Solutions Architect, Business Systems Analyst supporting data and analytic software development projects. The Business Analyst supports various phases of product development from initial conception through to deployment and continuous improvement. The Business Anal...
The Pricing Operations Senior Analyst will review guarantee performance by client on a monthly basis, prepare financial performance reporting, provide reporting and information for audit requests, and partner with Underwriting, Networks, Sales/Account Management, Audit and Legal, to review contract ...
The Video Network Systems Engineer plays a pivotal role in our organization, providing essential support for both video installation projects, sales opportunities, and network engineering tasks. Collaborate with customer network engineers to design, implement, and maintain video network infrastructu...
Applicant is expected to conduct a range of cyber risk analysis and security assessment methods; implement patches and Security Technical Implementation Guides (STIGs) to address cyber vulnerabilities, feature changes, or obsolescence; develop documentation for specific installations and configurati...