Under the guidance of Director of Information Security, the Cyber Security Engineer will be responsible for administering and implementing enterprise information security architecture and technology solutions to address the emerging security and compliance needs of the business. Provide input into a...
The Cyber Security Engineer III provides a detailed level of engineering support for all information security tools by determining security requirements, planning, implementing, and administering security systems. Mentors and trains cybersecurity team on security tools and security best practices. I...
Do you have related experience and are willing to take it further by learning how to defend an enterprise against cyber-attacks? Do you have the right attitude and are eager to join a multinational team of Cyber Security professionals?. This team operates under the banner of the Cyber Intelligence C...
The Cybersecurity Analyst III leads the development and maintenance of the CoreCivic cyber regulatory compliance program to support the alignment of security architectures, plans, controls, processes, policies and procedures with security standards and operational goals. Suggested certifications for...
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication. At Regions, the Cyber Secu...
Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. Temporary - Cyber Security Analyst. Enforce security policies and procedures by administering and monitoring security pro...
Reporting to Chief Technology Officer, the Director of Cyber Security provides leadership for the Cyber Security department. Chief Technology Officer Director of Cyber Security Position Summary Ministry Alignment FLSA Status: Exempt Classification: Director Team Member: Master Focus and Scope - Esse...
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication. Job Description:At Regions...
Security, Cyber security, Vulnerability assessment, Vulnerability detection, 3rd party risk management, audit, nist, Vulnerability, trainingAdditional Skills & Qualifications:Leads the validation process to ensure that Information Security Policy and Standard documents meet or exceed industry standa...
Cyber Threat Operations Center (CTOC) OverviewThe is a pivotal role on the Security Incident Response Team within the Cyber Threat Operation Center (CTOC) at Cardinal Health. Cardinal Health’s Information Security team is on a tremendous growth journey adding a number of new team members in our Cybe...
Additionally identify, evaluate, and report on regulatory, IT, and cybersecurity risks to information assets while supporting and advancing business objectives. This role assists with complex security design, development, and implementation activities aligned with several technologies including, but...
Basic proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls assessment, and security control gap analysis. Proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls ass...
Manages the Cyber Security Awareness program, including LMS course content management, phishing assessment oversite, MAC compliance for associates and contractors, and ongoing cyber security awareness event coordination. Manager – Cyber Security & Privacy Governance to join our team. Strong backgrou...
The Cyber Security Engineer III provides a detailed level of engineering support for all information security tools by determining security requirements, planning, implementing, and administering security systems. Mentors and trains cybersecurity team on security tools and security best practices. I...
At Regions, the Cyber Security Architect contributes to the advancement of Regions’ cyber security program and its capabilities through developing, communicating, and implementing a security architecture. Performs assessments using the National Institute of Standards and Technology (NIST) Cyber Secu...
The Specialist Cyber Security serves as the day-to-day administrator for the company’s cybersecurity tools and devices. The Specialist Cyber Security is expected to contribute to the corporate security strategy with security leadership and work with the IT team members. The Specialist Cyber Security...
This job is part of EPRI’s Information, Communications, and Cyber Security (ICCS) group with a particular focus in the DER Data and Connectivity research topics. An interest in learning new application-layer protocols and cyber security practices for DER technologies. EPRI participates in E-Verify, ...
Under the directive of the Information Security Officer, the cyber security analyst will implement security strategies and best practices in accordance with regulatory standards. Temporary - Cyber Security Analyst. Enforce security policies and procedures by administering and monitoring security pro...
This role monitors the domains of security controls including, but not limited to, malware defense, network security, Internet security, security analytics, threat intelligence and defense, cybercrime, data protection, vulnerability management, and customer authentication. At Regions, the Cyber Secu...
Security, Cyber security, Vulnerability assessment, Vulnerability detection, 3rd party risk management, audit, nist, Vulnerability, training. Looking for a Senior Cyber Security Analyst with 7+ years of experience. Consolidates and analyzes the organization’s critical cyber findings, vulnerabilities...
Cyber Security Engineer . Individual will be responsible for ensuring and hardening of their email and endpoint security, responsible for phishing campaigns, security reporting, etc. ...
Skills:*Cyber security, Siem, azure, tenable, meraki, cyberark About TEKsystems: We're partners in transformation. Description:*Our client is looking for a Cyber Security Engineer to join a team of 3 other engineers. URL Filtering experience*This role is a jack of all trades ...