The Security Identity & Access Management Analyst will provide provisioning for the Access Control Team as part of the Information Technology Department. As a Security Identity & Access Management Analyst, you will:. Responsible throughout the year to perform logical security reviews/audits, includi...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
CANDIDATE SKILLS AND QUALIFICATIONS.Candidates that do not meet or exceed the .Evaluate and review existing SIEM platform capabilities to determine current system state.Aspects include benchmarking of in use hardware, storage and virtualization features, evaluating overall system performance, invest...
The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, perso...
As a member of the Global Cyber Security Monitoring Team, the Analyst 3, Security is a highly experienced professional responsible for correlation, analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for ...
As a Cybersecurity Analyst, you will play a crucial role in identifying, analyzing, and mitigating security threats. Key Responsibilities for the Cyber Security Analyst:. Preferred Qualifications for the Cyber Security Analyst:. Preferred Skills for the Cyber Security Analyst:. ...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
Access administration and Security controls, threats and vulnerabilities)</li> <li>Coordinate all security designs with various Business Units and Cybersecurity teams</li> <li>Analyze and implement security requirements</li> <li>Recommends and develops security me...
As a member of the Global Cyber Security Correlations Team, the Analyst 2, Security is an experienced professional responsible for analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for analyzing system ...
Job description Infosys is seeking a UVM Application Security Analyst. ...
Principal Business Analyst - Financial. Designs, Develops, Manages and Executes complex business processes and makes recommendations to improve and support business activities. Coordinates business analyst tasks on information technology projects and provide project team member guidance/support thro...
Be part of a team that unleashes the power of leading-edge technologies to help improve the health and well-being of those most vulnerable in our country and communities.Working at Gainwell carries its rewards.You’ll have an incredible opportunity to grow your career in a company that values work fl...
Business Analyst / Data Analyst - PBM. Business Analyst / Data Analyst. You will be working as a member of a project team functioning as a business analyst for a PBM client utilizing waterfall and agile methodologies. Be a supportive bridge between clients, project managers and technical personnel t...
Jr Business Process Analyst (SQL). Analyze, plan, design, document and make recommendations to improve business processes to support client’s technological aspirations . Be a supportive bridge between clients, project managers and technical personnel to define, track and communicate business require...
Jr Business Process Analyst (SQL). Analyze, plan, design, document and make recommendations to improve business processes to support client’s technological aspirations . Be a supportive bridge between clients, project managers and technical personnel to define, track and communicate business require...
Business Analyst / Data Analyst - PBM. Business Analyst / Data Analyst. You will be working as a member of a project team functioning as a business analyst for a PBM client utilizing waterfall and agile methodologies. Be a supportive bridge between clients, project managers and technical personnel t...
Astin Enterprises dba Main Street Security is seeking self-directed, highly motivated individuals to serve as a full time Security Specialist at a location primarily in downtown Bryan. Possesses a Level II Texas Private Security License. Reports all irregularities, emergencies, or suspicious activit...
Applicant is expected to conduct a range of cyber risk analysis and security assessment methods; implement patches and Security Technical Implementation Guides (STIGs) to address cyber vulnerabilities, feature changes, or obsolescence; develop documentation for specific installations and configurati...
Splunk is looking for a motivated Senior Analyst who is passionate about delivering technology assurance, advisory, compliance and risk management services to the company. You will ensure proper identification and mitigation of risks / processes / internal control gaps that have potential operationa...
Extensive experience in analyzing and documenting business requirements and system functional specifications including Use Cases, Data and GAP Analysis. Efficient in writing Business Requirements Document (BRD), Non-Functional Requirement Documents (NFRD), Functional Requirement Document (FRD), Use ...
Detention Officers should be able to communicate effectively to all levels of officers, management and administrators at local, county and federal facilities. Starside Security & Investigation, Inc. Detention Services Division (DSD) is looking for Detention Officers for Government Contracts in Weste...
At the core of Security Engineers, we have a team of trained and professional Security Officers who serve as the backbone of our operations. Security Engineers is a respected provider of contract security services, operating across multiple States. As Security Engineers continues to grow, we activel...
Documents incidents and restraints; exchanges information with probation officers; testifies in court. Ability to be certified as a Texas Juvenile Detention Officer. Knowledge of State Juvenile Detention Standards; understanding of adolescent behavior and facility security. ...