The Information Analyst will play a crucial role in our Operations Information Management team. ...
Knowledge of interactions design information architecture and user flows. Please hit APPLY to provide the required information, and we will be back in touch as soon as possible. One of Largest IT Consulting Staffing firms in the USA – Recognized as #4 by Staffing Industry Analysts (SIA 2022). ...
Knowledge of interactions design information architecture and user flows. Please hit APPLY to provide the required information, and we will be back in touch as soon as possible. One of Largest IT Consulting Staffing firms in the USA – Recognized as #4 by Staffing Industry Analysts (SIA 2022). ...
As a Business Analyst with Resource Data, you will be responsible for eliciting, analyzing and documenting requirements as needed, including determination of system impact and software configuration. Agile (or other) SDLC projects as a Business Analyst. Collects information through subject matt...
They contribute to the product as engineers too, but their primary focus is to improve security through state of the art practices - from table-top threat model exercises to architecture reviews, from extended security testing with fuzzers and static analysis tools to external security analyst liais...
We have opened several senior/staff Security Operations Engineer (SOC) positions, creating a new team reporting to the CISO. The Security Operations (SecOps) team is responsible for design, implementation and evolution of Canonical security practices, techniques, tools, systems and policies. They de...
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
As a Network Security Engineer, you will be a vital part of our team, responsible for ensuring the security and integrity of our network infrastructure. Plan, design, and evaluate new and existing computer network systems and services, with a focus on cybersecurity principles and best practices. Col...
This position is responsible for ensuring the integrity of the Associations Geographic Information System (GIS), as well as performing a wide range of GIS, mapping, and data-related tasks, with a primary focus on data input, quality control, quality assurance, data management, data analysis, process...
If you are interested in the Business Intelligence Analyst position and you have the expertise, skills and energy to match our mission to provide independence through housing, we encourage you to apply. Collaborate with business and functional areas to identify and document business requirements, tr...
At Regions, the Network Security Engineer is responsible for the day-to-day maintenance and operation of Information Security systems to ensure controls are adequate and effective. This engineer should be capable of analyzing scenarios, recommending solutions, and implementing controls to protect th...
At Regions, the Network Security Engineer is responsible for the day-to-day maintenance and operation of Information Security systems to ensure controls are adequate and effective. This engineer should be capable of analyzing scenarios, recommending solutions, and implementing controls to protect th...
Contributes expertise in particular business processes and is responsible for formulating systems/process scope and objectives relative to the organization's business plan and user requirements, process flow definitions, business process mapping and functional specifications. WM Analyst IV, Digit...
We currently have a career opening for an Engineer, Cyber Security Operations (IR). Cyber Threat Operations Center (CTOC) OverviewThe is a pivotal role on the Security Incident Response Team within the Cyber Threat Operation Center (CTOC) at Cardinal Health. The ideal candidate’s unique blend of pla...
We are seeking security engineers to investigate sophisticated threat actors, advance investigative methods, automate and mature team processes through tooling, and use innovative approaches to protecting people from offline harm. Required Skills:Security Engineer, Investigations - i3 Responsibiliti...
SummaryThe Technology Business Management Analyst will be responsible for implementing, maintaining, validating and improving capabilities under the leadership of the Technology Business Management Team Lead. Collaborate with stakeholders across the technology team to identify areas of opportunities...
As a Business Analyst with Resource Data, you will be responsible for eliciting, analyzing and documenting requirements as needed, including determination of system impact and software configuration. Agile (or other) SDLC projects as a Business Analyst. Collects information through subject matter in...
As a Senior Business Analyst with Resource Data, you will be responsible for eliciting, analyzing and documenting requirements as needed, including determination of system impact and software configuration. Documents technical and business processes/workflows in narrative and diagrammatic forms foll...
This job works collaboratively to support of all risk and compliance assessment activities of Highmark Health across a broad range of frameworks including NIST, HITRUST, PCI, HIPAA, SOC, MAR, CMS, JCAHO, etc. Collaborate and communicate with Information Security, Privacy, Procurement, Audit, Complia...
At least 1 year of specialized experience, equivalent to GS-12 grade level in Federal service: conducting short- and long-term planning, program development, policy, and program analysis; providing data management technical oversight, using data from a variety of sources to produce performance and p...
As a Network Security Engineer, you will be a vital part of our team, responsible for ensuring the security and integrity of our network infrastructure. Plan, design, and evaluate new and existing computer network systems and services, with a focus on cybersecurity principles and best practices. Col...
Additional Qualifications for Data Analyst III: Meets all requirements of Data Analyst II in addition to the following:. Two years experience in data mining, extraction, analysis, and reporting using structured query language, analyzer, data and report writing tools such as MS Query Analyzer/SQL Ent...
To that end, HW Security also works closely with OCI's operations and engineering teams, constantly striving to improve Oracle Cloud's overall operational security posture by defining the supply chain and operational requirements to establish best practices for managing security for every device in ...
The Supply Chain Compliance Analyst will:. Assist procurement professionals by providing compliance guidance and training. Review single and sole source justifications, commercial item determinations, and other documents for compliance with company policies and legal direction. Investigate and resol...
The Data Integrations Analyst II works closely with customer liaisons and Business Analysts on gathering customer data and information requirements as a key enabler of data transformation and the company’s end-to- end technology solutions. The Data Integrations Analyst II plays a key role in the des...