The Senior Analyst IT Compliance is responsible for providing guidance and oversight in all regulatory areas that MGMRI IT must comply with. The Senior Analyst acts as the IT Compliance area's subject matter expert on onboarding and regulatory licensing as they pertain to IT. ...
As an Information System Security Officer, you will be responsible for ensuring the security and integrity of our organization's information systems. Your role would be to provide Cybersecurity support as an Information Systems Security Officer (ISSO) ensuring the confidentiality, integrity, availab...
Information Systems Security Officer (ISSO). Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker,...
Bachelor's degree in Business Administration, Public Health, Information Systems or a related field from an accredited college or university, or equivalent experience with a minimum of 6-years Business Process Analyst experience in Public Health Care process improvement•Minimum of 5-7 years of exper...
Performs modeling of data sources and flows, works with data management staff to define an operational framework that will define, develop and implement policies and security frameworks to ensure precise and secure delivery of knowledge and information. Perform modeling of data sources and flows, wo...
As an Information System Security Officer, you will be responsible for ensuring the security and integrity of our organization's information systems. Zachary Piper is seeking a Mid-level Information System Security Officer (ISSO) who will support mission training exercises for a NAVAIR program in Fa...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
This job consults with cross-functional groups and levels to identify data and analytical needs, conduct analyses, review analyses and findings with leadership, facilitate related process/data improvement efforts, and develop executive level presentations. Develop and implement data collection syste...
Uses regular judgement and discretion to collaborate with customers in order to: Understand capability needs; Gather project specifications; Create business cases and cost sheet analysis; Translate high-level business needs into detailed requirements for new capabilities (and change request/enhancem...
The Business Analyst collaborates with the Product Owner on requirements, business value scoring and success metrics. As a Business Analyst, candidate performs the core duties of a BA and typically work with medium to large BU requests that have issues, requests or projects of moderate scope and com...
The Staff Security Engineer of IAM will be a product owner and lead engineer within Identity Access Management (IAM) space for CVS Health. This position will include leading multiple projects simultaneously and hands-on engineering of IAM solutions. Operating within DevOps and Agile frameworks as pa...
Ensures data integrity and compliance by performing data cleansing, data audit and/or data validation. Ensure data integrity and compliance by performing data cleansing, data audit and/or data validation. Provides business process, system support and data quality governance through data coordination...
This is a collaborative role and requires an interdisciplinary technical background with skillsets in systems and application administration, data engineering, security operations, and detection engineering. Provide guidance and support to junior security engineers and platform users. This role is r...
Experience with distributed data processing tools like Hive, Spark, Airflow and. Experience with distributed data processing tools like Hive, Spark, and Airflow is a plus. The Senior Data / ML Engineer:. Improve machine learning data quality by using & building tools to automatically detect issu...
As an Information System Security Officer, you will be responsible for ensuring the security and integrity of our organization's information systems. Zachary Piper is seeking a Mid-level Information System Security Officer (ISSO) who will support mission training exercises for a NAVAIR program in Fa...
The Social Media Compliance position is responsible for ensuring legal compliance and safety of content uploaded to a popular social media network for short-form videos. ...
Proven experience as a Business Systems Analyst with a minimum of 8+ years of experience in business analysis and system design. Bachelor's degree in Business Administration, Information Technology, or a related field (Master's degree preferred). Proficiency in business analysis tools and techniques...
The IT Data Architecture Net Centricity Analyst will advise and assist the DECIFER Contract Project Manager and Government Test Director and contract team in various facets of IT Data Architecture Net Centricity to support the planning, development, and execution of all contract deliverables CDRLs I...
Help define security configuration and operations standards for security systems and applications, including policy assessment, compliance tools, network security appliances, and host-based security systems. Northwest Partners</b> is seeking an experienced hybrid <b>Security Engineer&l...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Business System Analyst role supports the Business by working with Business Management, Subject Matter Experts, Product Owners, Project Managers, Technical Leads and Developers to provide Business Needs Analysis, Requirements elicitation, Requirements elaboration and Use Case/Story development. Form...
Define requirements modeling standards to include definition of business needs, how and when to reuse functional requirements, and business scope of non-functional requirements. Use exceptional knowledge of business analysis to create compelling presentations and influences business leaders to make ...
Information Systems Security Officer (ISSO). Performing vulnerability assessments using the Assured Compliance Assessment Solution (ACAS), Defense Information Systems Agency (DISA) Security Technical Implementation Guide (STIG), and the Security Content Automation Protocol (SCAP) Compliance Checker,...