The Security Analyst I is a key contributor in the development, implementation, and monitoring of a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality, and availability of information that is owned, controlled, or processed by IPG. Collabor...
Complete an information system security course of instruction appropriate to level of responsibilities. Familiar with information system security architectural documentation standards. Able to apply information assurance / cyber security standards, directives, guidance and policies to an architectur...
Primarily responsible for API application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management). Hands-on experience performing application API security assessment, static and dynamic security assessme...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
L3Harris is currently seeking a Security / Vulnerability Research Engineer to join our team. This is an extremely exciting position working with National Security customers to protect and defend our nation. L3Harris Technologies is seeking the best of the best to support our Security Vulnerability a...
As a L3Harris Senior Principal Cyber Engineer for L3Harris, you will lead multiple teams in support of cyber software capabilities development, integration, and testing in multiple disciplines including vulnerability research, embedded systems reverse engineering, CNO/CNE development, hardware emula...
As the Information Security Risk Management Specialist, you will utilize your wide area of expertise in risk management, security frameworks, regulatory compliance, cybersecurity, vulnerability management, disaster recovery and business continuity planning, incident management, and other areas to pr...
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at. Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Ensuring all appl...
We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accurately processing submissions sent electronically by our members.A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy a...
As a Tiffany Branch Security Officer, you will:. Partner with Senior Security Officer and Management to deter theft, report missing assets, respond to emergency situations and implement Incident Management Programs procedures. Security Controls and Operations: . Provide exceptional security and oper...
The Sr Commercial Real Estate (CRE) Data Analyst will analyze credit and economic data to estimate the degree of risk and trends involved in various commercial real estate property types. Provide supervision and oversight to maintain quality control of overall CRE data analyst function. Manage and m...
Chief Engineer for multiple MK54 Lightweight Torpedo programs. Provide familiarization training to engineering and manufacturing team on hardware functions, interfaces, critical features, failure analysis. Engineering related field required, M. ...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Customer Writing detailed business requirements (User Stories) and functional solutions Define environment requirements (i. Interfaces, file drop etc) Product knowledge transfer to customer and internal stakeholders Business support to delivery teams during the entire software implementation process...
The ideal candidate has experience with public safety and security and operates with a high degree of integrity at all times. Provide customer service to our clients by carrying out safety and security procedures, site-specific policies, and when appropriate, emergency response activities. Previous ...
Perform detailed analysis of complex business process requirements and provide appropriate system solutions. Conduct workshops to collect business requirements. Map client business requirements, processes, and objectives. Proactively propose business process and system enhancements. ...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
Some assignments may patrol assigned site on foot or in vehicle, checks for unsafe conditions such as hazards, unlocked doors, and security violations; protects evidence or scenes of incident in the event of accidents, emergencies, or security investigations; prepares logs or reports as requested. T...
As a security engineer reporting to the Vice President of Security Engineering, you will be responsible for the implementation, maintenance, support, and advancement of our security solutions. Bachelor's degree in Computer Science, Information Security, or a related field. You will collaborate acros...
They are looking for a Senior SAP Finance Business Analyst to support their business needs within their SAP enterprise business system. The Analyst focuses on systems analysis, requirements gathering, design, configuration, testing, implementation, and maintenance activities for finance business nee...
Reporting to the Director, Information Security, you will assess and respond to adversarial attacks, execute against a security strategy and roadmap for Unified Women’s Healthcare, partner with internal teams and affiliates to mitigate risk, provide coaching and support to more junior security engin...
Peraton will deliver a broad spectrum centralized IT infrastructure, services, and processes to include Cybersecurity Task Order (CTO) compliance activities for the USSOUTHCOM networks to include three enduring Joint Task Forces (JTFs) and multiple Security Cooperation Office(s) (SCO). Peraton is se...
A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy and that supporting documentation meets specified requirements. We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accura...
A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy and that supporting documentation meets specified requirements. We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accura...
Business Analyst plays a critical role in supporting the business team by handling the configuration and home Office onboarding actions for our digital products. You will be a part of the Broadridge Advisor Solutions team using your business analysis skills to listen to clients and translate busines...