A company is looking for an Information Security Risk/Audit Manager to support the information security program for state government healthcare information systems. ...
The mission of the Information Security Team at iSpot is to protect customer and corporate data and the provided data analysis through cybersecurity and technical controls. Collaborate on defining policies, standards, and procedures for the information security program,. Experienced in contributing ...
A company is looking for an Information Security Analyst II to monitor and respond to information security events within a large enterprise technology ecosystem. ...
Our fast-paced, highly collaborative Information Security & Governance team is hiring an Information Security Analyst to help enable the Slalom brand by protecting the confidentiality, integrity, and availability of Slalom and our clients' data. The successful candidate will be responsible for c...
A company is looking for a Senior Information Security Engineer to lead projects supporting the corporate enterprise information security strategy. ...
Collaborate with IT and security teams to ensure compliance with security policies. Proficiency in Microsoft security technologies and tools, including Purview Information Protection, DLP, data lifecycle management, records management, and Azure data governance. Our focus is Microsoft's six go-to-ma...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Now Brewing – information security engineer senior, identity management #tobeapartner!. As a senior information security engineer, you will be responsible for guiding the team through deployments and project deliverables, proactively finding opportunities to improve identity services and mentor juni...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
The Information Security Machine Learning (ISML) team empowers information security by harnessing patterns and insights from vast amounts of data to predict, detect, and respond; transforming reactive security into autonomous protection. It approaches this through a few main functions including solv...
Knowledge in information security fundamentals (threat modeling, penetration testing, incident response, network security, physical security, etc. Information security related certificates such as CISSP, CISM, CISA, CCNP Security+, SANs. Manage our security monitoring platform and respond to network...
Ensures efficacy of data and information solution delivery, including prioritizing technology debt, compliance, and security items and supports application performance in production, including application health, resiliency, security, enterprise data management standards, global records management s...
Certifications such as CISSP, CISM, CIPM or others focused on information security, data privacy or information risk management is desired. Now Brewing - information security manager, risk management! #tobeapartner. As an information security manager, risk management, you will… . Progressive experie...
Cyber Security Technology (CST) is a globally distributed team responsible for cyber security innovation, architecture, engineering, solutions and capabilities development, cyber resiliency, access management engineering, data strategy, deployment maintenance, technical project management and inform...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect - Healthcare Delivery Technology serves as the most senior security architect and advance...
We are seeking a highly skilled and experienced Senior Cloud Data Architect with a strong focus on cybersecurity. As a Senior Cloud Data Architect, you will be responsible for designing secure and scalable architecture solutions to safeguard our organization’s critical information assets. You will w...
Alongside the Information Security team, responsible for responding to and remediating security events / incidents. Job Title: Information Security Risk and Compliance Engineer. Job Summary: The Information Security Risk and Compliance engineer plans, develops, and implements the company's technical...
Our fast-paced, highly collaborative Information Security & Governance team is hiring an Information Security Analyst to help enable the Slalom brand by protecting the confidentiality, integrity, and availability of Slalom and our clients' data. The successful candidate will be responsible for contr...
Certifications such as CISSP, CISA, CIPP, or others focused on information security, data privacy or information risk management is desired. Now Brewing – information security corrective action data analyst! #tobeapartner . As an information security corrective action data analyst, you will…. This p...
The Information Security Analyst responds to and remediates information security events; promotes and supports the secure use of networked servers and desktops by faculty, staff, and students; serves as a member of the information security Incident Response team as specified in University policy; pa...
GENERAL PURPOSE: Under general direction from the Chief Information Security Officer, the Deputy Director - Information Security Architecture & Engineering performs at a senior professional level to secure the agency’s information and technology systems by playing a key role in the strategic and ope...
Works with information security and IT leadership to develop strategies and plans to improve the security practices of the organization. WaFd Bank is seeking a talented individual to collaborate and contribute to the overall development and implementation of a risk-based information security program...
Certifications such as CISA, CISSP, PCI ISA/QSA, CISM, CIPM or others focused on controls assurance, information security, data privacy or information risk management is a strong plus. Now Brewing – information security, corrective action product manager! #tobeapartner . As an information security c...
Demonstrated experience in developing, implementing, and enforcing security policies, standards, and procedures to ensure regulatory compliance and protect organizational information assets. Working with the application leads, sysadmins, dbas, developers and testers to ensure the assigned systems ar...