Serves as a data analyst performing research and requirement analysis, creation and design of data specifications and mapping documents, and presents findings to team members, clients, and vendors. Build complex data sets from multiple data sources and write complex data flows using. Proficient in S...
Serves as a data analyst performing research and requirement analysis, creation and design of data specifications and mapping documents, and presents findings to team members, clients, and vendors. Build complex data sets from multiple data sources and write complex data flows using. Proficient in S...
Serves as a data analyst performing research and requirement analysis, creation and design of data specifications and mapping documents, and presents findings to team members, clients, and vendors. Build complex data sets from multiple data sources and write complex data flows using. Proficient in S...
The Security Operations and Intelligence Center (SOIC) is the centralized hub into which critical issues flow. Assist the Dublin Security Team with Security Officer Scheduling and call offs. Security/Security Solutions, Intelligence Analysis, Military, Law Enforcement, Corrections, Risk Management, ...
Security Implementation and Operations - Operationalize documented compliance policies and deliver day-to-day security operations and support Administer security applications and infrastructures Review systems, applications, and facilities access Conduct and/or assist with vulnerability scans Patch ...
Prepares analysis to identify trends and issues, troubleshoot errors, validates data against other data sources, requirements and/or technical specifications, and work with data exchange processes and workflows between Company, government entities, and delegated entities to ensure accurate and compl...
Security Management - Establishment, facilitation or directing of cyber and physical security processes to protect an organization's facilities, assets, information, and services Drive organizational alignment to the company's chosen security framework and perform regular reviews(15%). The Security ...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Performs modeling of data sources and flows, works with data management staff to define an operational framework that will define, develop and implement policies and security frameworks to ensure precise and secure delivery of knowledge and information. Perform modeling of data sources and flows, wo...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Security Implementation – This could include the following: documenting procedures, Administer security applications, system and/or security reviews, vulnerability scans, system patching, and other security related tasks. This position is responsible for security alert monitoring and remediation for...
Provides comprehensive technology support at the highest level on the design, project management, installation, maintenance, testing, and support of local area networks, routing, switching, wide area data networks, internet protocols and architecture, and information security solutions and technolog...
This job consults with cross-functional groups and levels to identify data and analytical needs, conduct analyses, review analyses and findings with leadership, facilitate related process/data improvement efforts, and develop executive level presentations. Develop and implement data collection syste...
We are looking for a detail-oriented and experienced Master Data Analyst Support Leader to manage and enhance the Material Master data processes within our SAP environment. Direct workload and tasks for the Master Data Analysts (MDAs) and maintain functional and technical specifications for new data...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
As Data Integration Analyst JMETC, you will support test infrastructure test performance analysis and reporting, necessary to support expansion of joint distributed test events and effectively integrating live, virtual, and constructive (LVC) test resources. Tasks may vary from descriptions or stati...
The Senior Security Analyst is also responsible for applying technical and functional expertise to collect, normalize, characterize cyber incident, and event data to identify anomalous or malicious activity including intrusions, attacks, data loss or other prohibited activities. The Senior Security ...
Ensures data integrity and compliance by performing data cleansing, data audit and/or data validation. Ensure data integrity and compliance by performing data cleansing, data audit and/or data validation. Provides business process, system support and data quality governance through data coordination...
As a Security Engineer III at JPMorgan Chase within the Cybersecurity and Technology Controls, you serve as a seasoned member of a team that works to deliver software solutions that satisfy pre-defined functional and user requirements with the added dimension of preventing misuse, circumvention, and...
The Staff Security Engineer of IAM will be a product owner and lead engineer within Identity Access Management (IAM) space for CVS Health. This position will include leading multiple projects simultaneously and hands-on engineering of IAM solutions. Operating within DevOps and Agile frameworks as pa...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
Currently seeking a highly skilled Identity Engineer with expertise in security products, authentication, authorization, and identity and access management (IAM). Stay informed of EntraID/Okta updates, security threats, and industry best practices to enhance our security posture. As a key member of ...
This role demands a comprehensive understanding of GCP security and compliance frameworks, and the ability to implement and maintain robust cloud security measures. Perform Google Cloud Security Posture Review (CSPR) remediations, ensuring adherence to security policies and best practices. Stay curr...
Facilitate partnership between data stewards and technical leaders to identify and solve enterprise data issues. Oversee curation and maintenance of business glossary terms and data definitions. Develop and implement data policies using change management practices. Oversee development and maintenanc...
The team comprises engineers of multiple disciplines including vulnerability research, reverse engineering, CNO/CNE development, hardware emulation, system engineering, and data analytics. Our engineers do more than just work with cutting-edge technology—they ensure the missions succeed for the cust...