Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ECSA EC-Council Certified Security Analyst. Five (5) years of experience, specifically in a security analyst job for a computing infrastructure environm...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
We follow most modern software development practices influenced by agile methodologies, devops principles, and site reliability engineering. The engineer will primarily support sensor and data fusion efforts, but will also be expected to support general software development tasks as needed, to inclu...
Azure Cloud Software Developer and Engineer. The Azure Cloud Software Developer and Engineer will be supporting the Cloud One Common Computing Environment (CCE) program under the Air Force Lifecycle Management Center Office for Network Integration (AFLCMC/HNI). Address security findings and vulnerab...
Experience documenting security controls in a System Security Plan (SSP) and how the controls are being implemented. Familiar with Risk Management Framework (RMF), Cloud Security Requirements Guide (SRG), National Institute of Standards and Technology (NIST) guides, and Security Technical Implementa...
Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and the DoD Risk Management Framework and support full spectrum military cyberspace operations. Bachelor’s Degree in an...
Business Analyst plays a critical role in supporting the business team by handling the configuration and home Office onboarding actions for our digital products. You will be a part of the Broadridge Advisor Solutions team using your business analysis skills to listen to clients and translate busines...
This job consults with cross-functional groups and levels to identify data and analytical needs, conduct analyses, review analyses and findings with leadership, facilitate related process/data improvement efforts, and develop executive level presentations. Develop and implement data collection syste...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
The incumbent delivers data profiling, conducts testing and systems validation to troubleshoot data anomalies, monitors data management metrics and data loads. This job understands healthcare data from end-to-end and analyzes raw data and analytic data for the enterprise. Verify analytic data for th...
Perform detailed analysis of complex business process requirements and provide appropriate system solutions. Conduct workshops to collect business requirements. Map client business requirements, processes, and objectives. Proactively propose business process and system enhancements. ...
Ensures data integrity and compliance by performing data cleansing, data audit and/or data validation. Ensure data integrity and compliance by performing data cleansing, data audit and/or data validation. Provides business process, system support and data quality governance through data coordination...
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at. Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Ensuring all appl...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
Overseeing all Security related disciplines to include SAP and SCI: Personnel Security (PERSEC); Security Education; Physical Security w/ ICD 705, Classification Management, while utilizing the requirements set forth in the DoD SAP Manuals Volumes 1-4. Lockheed Martin Rotary and Mission Systems (RMS...
Business Analyst, with a focus on business process modeling and business requirements documentation . Business Analyst will support our Salesforce CPQ implementation teams and help our teams meet business needs with an organized, proactive approach. BA - Business Process Modeling and Salesforce Spec...
Applies basic knowledge of compliance, business, analytical, and communication skills to support compliance programs and processes that promote compliant and ethical behavior, meet regulatory obligations, and prevent, detect, and mitigate compliance risks. This position will focus on compliance with...
To manage a staff of data analysts; to develop complex reports and analyze company data including Corporate or client specific data; to serve as a technical resource for company staff on data analysis and benchmarking issues; to meet with clients on such issues as necessary; to provide training and ...
Uses regular judgement and discretion to collaborate with customers in order to: Understand capability needs; Gather project specifications; Create business cases and cost sheet analysis; Translate high-level business needs into detailed requirements for new capabilities (and change request/enhancem...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...