The Enterprise Information Security Analyst will assist with meeting the requirements of all four domains: Security Oversight, IT Risk Assessment, Security Engineering, and Security Operations and focus in depth upon the domain requirements of Security Operations and IT Risk Assessment. Under the di...
Analyst - Amazon Web Services (AWS) is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on incident response, data spillage response, eDiscovery/legal retention, phishing/spam/malware response, and threat hunting. Account...
Responsible for installing and uninstalling various security programs These programs often protect sensitive data using firewalls and data-encryption technology, and they must be updated on a regular basis to remove bugs and add new features. This position will perform Security Administrator duties ...
Cyber Security Analyst (multiple openings) in Austin, TX to. Serve as part of Visa's Cybersecurity Audit and Compliance (A&C) function within the Cybersecurity Governance Risk and Compliance (GRC) team. Assist with validating the ongoing effectiveness of Cybersecurity controls across Visa (both ...
Analyst is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on data loss prevention (DLP), data aggregation/sharing monitoring, sensitive information management, cryptographic services, telemetry logging, and secure file ...
Lentech has an exciting opportunity for an experienced Information Assurance Security Analyst. Contribute to a security team managing security compliance, continuous monitoring, and supporting audits for multiple systems to maintain their Authority to Operate (ATO). Prepare for and assist in the for...
InformationSecurity #SecurityAnalyst #AustinJobs #CyberSecurity #SIEM #Splunk #Crowdstrike #Symantec. Join Our Team as an Information Security Analyst!. We are seeking a dedicated Information Security Analyst to join our team in Austin. Monitor and analyze security event logs using SIEM tools (Splun...
Knowledge of common information security management frameworks such as the NIST Risk Management Framework, NIST Cybersecurity Framework, and Texas Information Security Standards 1-3 Experience conducting and documenting risk assessments and associated reports and supporting documentation. Work invol...
The objective of this role is to drive and achieve maximum security compliance status and ensure that all implementations follow the Marriott security standards. The role will perform tracking and reporting on the established security metrics and will have a direct reporting line to the Senior Direc...
Our Security Operations team is growing and currently looking for a Security Operations Analyst II. You will interact closely with associates across IT (including Security Engineer, Application Security, Security Architecture, GRC, Infrastructure, and IAM). Your hands-on security technical expertise...
Mature and automate processes, where possible, to manage security risk including:Maintain awareness of existing and proposed enterprise information security policies, standards, and procedures. Lead the design, evaluation and oversight of controls for key security and security IT projects, programs,...
Analyst - Amazon Web Services (AWS) is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on incident response, data spillage response, eDiscovery/legal retention, phishing/spam/malware response, and threat hunting. Account...
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Complia...
Analyst is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on data loss prevention (DLP), data aggregation/sharing monitoring, sensitive information management, cryptographic services, telemetry logging, and secure file ...
BCT has teamed up with a Dallas industry leader who is seeking an experienced IT Security Compliance Specialist to lead and manage their IT compliance programs, ensuring adherence to regulations such as SOX, PCI, and other cybersecurity frameworks. Benefits offered include:</li> <li>Medi...
Monitor security events, analyze security logs, and investigate potential security incidents. Conduct threat hunting, incident analysis, and root cause analysis to identify security threats and vulnerabilities. Assess and prioritize security risks, and recommend mitigation strategies and controls. C...
The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus software to maintain security. CTI analyst experience within a security operations center (SOC), providing support to internal cyberse...
The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
Implements continuous automated security compliance capabilities with technical support staff, the Security and Data Operations Team, and the Information Security Office. Comptroller - Identity and Access Management Security Analyst I(00043080). The IT division is looking for a security professional...
Review and report cyber-security threats and vulnerabilities and participate as one of the key members of any cyber-security-related incident response team. Requires 24 months of experience involving the following:Security information and event management-SIEM;Security Compliance; andRisk Analysis. ...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
You will accomplish this by collaborating with cross-functional teams – including other security analysts, threat detection engineers, vulnerability analysts, security engineers, system administrators, and developers – to proactively identify potential security risks and vulnerabilities within our c...
Solicitation Reference Number: Working Title: Network Security Analyst Title/Level: Network Security Analyst Category: Security. The network security analyst investigates security breaches, develops strategies for any security issues that arise, and utilizes the help of firewalls and antivirus softw...
Job description Infosys is seeking a UVM Application Security Analyst. ...