As a member of the Global Cyber Security Correlations Team, the Analyst 2, Security is an experienced professional responsible for analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for analyzing system ...
Job description Infosys is seeking a UVM Application Security Analyst. ...
CANDIDATE SKILLS AND QUALIFICATIONS.Candidates that do not meet or exceed the .Evaluate and review existing SIEM platform capabilities to determine current system state.Aspects include benchmarking of in use hardware, storage and virtualization features, evaluating overall system performance, invest...
The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
Join one of the nation's top ranked Title Insurance companies, looking for an Application Security Engineer to join their security team. Highly visible - Direct channels to the Director of Information Security. Expertise in cloud security - Azure environments preferred. Experience with API security ...
The Data Security Analyst Risk Analyst will be responsible for reviewing, researching, and analyzing transactions with a focus on detecting and mitigating fraud. Systems Security Certified Professional (SSCP), Security+, or other security-related certifications. Cybersecurity, Information Security, ...
As a member of the Global Cyber Security Monitoring Team, the Analyst 3, Security is a highly experienced professional responsible for correlation, analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for ...
We are seeking an experienced Technical Business Analyst (Integrations/Acquisitions/Security) to join our team on a contract basis. Key Skills: Technical writing, business analysis, integration technologies, Microsoft, Google Suite, Security posture, Security protocols, APIs, documentation, acquisit...
This is your opportunity to start a lifelong career with unlimited opportunity.Discover the flexibility youve been searching for by taking a minute to finish our online application.No experience, Willing to train.Ability to work within recognized turnaround times.Must have exceptional social skills ...
A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy and that supporting documentation meets specified requirements. We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accura...
The Business Analyst Oracle Financials will be part of Oracle ERP team, responsible for understanding business requirement, building functional specification, building report, configuring Oracle Financial system for business needs, understanding accounting implications, deploying and supporting Orac...
Performs modeling of data sources and flows, works with data management staff to define an operational framework that will define, develop and implement policies and security frameworks to ensure precise and secure delivery of knowledge and information. Perform modeling of data sources and flows, wo...
Applicant is expected to conduct a range of cyber risk analysis and security assessment methods; implement patches and Security Technical Implementation Guides (STIGs) to address cyber vulnerabilities, feature changes, or obsolescence; develop documentation for specific installations and configurati...
Solicitation Reference Number: Working Title: Business Analyst Title/Level: Business Analyst Category: Applications/Software Development Full Time. This position will perform the duties of a Business Analyst including requirement gathering, analysis of requirements, development of requirements and d...
As a part of the Analytics team, the Analytics Developer collaborates with their Business Partner peers, Analytics Engineers, and the Actuarial and Data Science teams in the use of technology solutions, analytic methodologies and data mining tools. Preference given to applicants with demonstrated ex...
Computer Science, Computer Engineering, Electrical Engineering, Computer Security, or Information Technology. The candidate is responsible for performing a wide array of cyber security assessment methodologies that leverage technical knowledge and threat intelligence to assess an embedded system’s s...
Network security engineer is part of the Network team responsible for the design, build and run global footprint of network security infrastructure to align with the existing operational support 24x7 high available and compliant environments for on-premises and cloud-based. Works closely with Infras...
To create work plans, monitor and track the work schedule for on time delivery as per the defined quality standards.To develop and guide the team members in enhancing their technical capabilities and increasing productivity.To ensure process improvement and compliance in the assigned module, and par...
Security Officers are dedicated security professionals with a demonstrated ability to work independently and as a member of a team in a fast-paced high-tech environment. Security Officers work as a team, patrolling the company’s properties via vehicle and foot and/or ensuring security at a series of...
Cybersecurity, IT, Security, Compliance, NIST, SOC, Azure, AWS, Cloud, Assessment, Audit, CISSP, CISM, Cyber Security. They are seeking a Cybersecurity Engineer to add to their team. Experience with Azure cloud infrastructure and security. Experience with risk management in compliance and security. ...
Documents incidents and restraints; exchanges information with probation officers; testifies in court. Ability to be certified as a Texas Juvenile Detention Officer. Knowledge of State Juvenile Detention Standards; understanding of adolescent behavior and facility security. ...
Security Industry Specialists, Inc. SIS) provides security solutions to some of the most recognized companies and brands in the world. In this role, you will: - Develop and implement strategic initiatives for recruiting diverse talent - Partner with hiring managers to forecast and develop plans for ...
Business Analyst, Product Manager, Business Systems Analyst or similar. PRINCIPAL BUSINESS DATA ANALYST. This includes a Principal Business Data Analyst to support various phases of product development from inception to deployment and beyond. In this role, you will work with business unit leaders to...