The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
We are seeking an experienced Technical Business Analyst (Integrations/Acquisitions/Security) to join our team on a contract basis. Key Skills: Technical writing, business analysis, integration technologies, Microsoft, Google Suite, Security posture, Security protocols, APIs, documentation, acquisit...
CANDIDATE SKILLS AND QUALIFICATIONS.Candidates that do not meet or exceed the .Evaluate and review existing SIEM platform capabilities to determine current system state.Aspects include benchmarking of in use hardware, storage and virtualization features, evaluating overall system performance, invest...
Job description Infosys is seeking a UVM Application Security Analyst. ...
Join one of the nation's top ranked Title Insurance companies, looking for an Application Security Engineer to join their security team. Highly visible - Direct channels to the Director of Information Security. Expertise in cloud security - Azure environments preferred. Experience with API security ...
As a member of the Global Cyber Security Correlations Team, the Analyst 2, Security is an experienced professional responsible for analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for analyzing system ...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
As a member of the Global Cyber Security Monitoring Team, the Analyst 3, Security is a highly experienced professional responsible for correlation, analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for ...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
New hires in Texas who have completed the security commission course with (TDPSPSB) must obtain their security commission prior to date of hire and 1) the officer’s commission card is active 2) the officer’s commission card is in the possession of the security officer 3) the CHRISTUS Vice President ...
The role of the Business Analyst is to strategize, develop, and refine operational procedures in support of collaborative agreements between the company and its Partners. The Business Analyst will oversee the generation and compilation of reports, Board communications, and project financial analyses...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
As the Cyber Systems Security Engineer you will be responsible for designing, implementing, deploying, and maintaining state of the art System Security architectures and countermeasures to protect and enable innovative new Lockheed Martin Missiles and Fire Control products. Providing embedded System...
You'll help build out their endpoint security tool for Linux Servers, working on their main product. Ideal candidates have 5+ years of experience with Linux Kernel development, and are highly adept with GNU kernel, LSM endpoint security frameworks, and have a background in Endpoint Detection and Res...
This role will report to the Manager of Security Platform Engineering within the Splunk Global Security (SGS) organization to join a hardworking team of security engineers. As a member of the Security Engineering team, you will be responsible for designing, developing and deploying tools and solutio...
Java Full stack developers, Python/Java developers, Data analysts/ Data Scientists, Machine Learning engineers. ...
About this position: • Job Title: Travel Specialist • Department: Administration • Location (City/State): Austin, TX • Employment Type: Full-Time About us: Security Industry Specialists, Inc. Paid Time Off including Sick/Safe Time • Medical, Dental, Vision Benefits for Full Time Employees • A dynami...
The Business Analyst II serves as a primary liaison between Technology Services and business end users. The Business Analyst II collaborates with the quality assurance and development team to ensure that they clearly understand the specifications to deliver quality products. Serves as Business Analy...
Collaborate with a team of business analysts making client recommendations that can improve business processes. Translate your clients business needs from the requirements generated for our technical teams into simpler non-tech language. Help your team analyze and document systems requirements and b...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
The Video Network Systems Engineer plays a pivotal role in our organization, providing essential support for both video installation projects, sales opportunities, and network engineering tasks. Collaborate with customer network engineers to design, implement, and maintain video network infrastructu...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
As a Cyber Systems Security Engineer, you will play a pivotal role in ensuring that cyber security requirements are effectively defined, decomposed, allocated, implemented, and assessed to create a resilient security solution for target platforms (Air Systems or Weapon Systems). Computer Science, Co...
Developing and maintaining databases and data systems. Data Analyst| Construction Management | Project Management| Problem-solving| Analysis |. Data visualization and reporting skills. Transforming data into a readable and useful format. ...
As a Financial Crime Compliance Analyst, you will work with Capgemini’s Financial Services industry clients, focusing on AML investigations, KYC, and sanctions screenings. Are you ready to kickstart your career with comprehensive training and continuous learning opportunities and make a difference i...