Required Technical Skills / Experiences· Strong knowledge in developing and implementing a Common Control Framework· (CCF)· Performing Security Control assessments and working with stakeholders to· remediate gaps· Conduct Risk Assessments of entries in the CyberSecurity Risk Register· Security Gener...
The Information Security Analyst is a wide-ranging, hands-on role encompassing the design, implementation, and maintenance of advanced cybersecurity technologies, performing in-depth security reviews for new projects and technologies, and providing a frontline response for security incidents. Report...
The Cyber Security SOC Analyst is responsible for security operations, including real-time analysis of security alert data and leading the response to potential security incidents. We are looking for a highly motivated and skilled Security Operations Center (SOC) Analyst to join our Incident Respons...
This involves assessing security controls and practices, analyzing security events and incidents, implementing security controls, configuring and managing security systems, conducting vulnerability scans and assessments, and performing various IT security-related tasks. Knowledge and experience in i...
Under the direction of the Manager, Information Security Operations, the Security Analyst is responsible for ensuring that information assets are adequately protected by actively maintaining and improving the enterprise Information Security program. Develops and enhances security use cases with the ...
Manage firewalls network and host intrusionprevention/detection systems virtual private networks threatintelligence platforms endpoint protection security trainingplatforms email security forensic tools public/private/hybrid cloudinfrastructure identity and access management systems and physicalsecu...
Security Analyst to coordinate with the Client’s Dental and Vision IT staff to keep the infrastructure and data secure within the CDV secure enclave and to bring the following skills:. Monitor security reports on vulnerabilities and anti-virus status on configured items and to work with the CDV-IT t...
Implements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities. ...
JOB DESCRIPTION Under the direction of the Manager, Information Security Operations, the Security Analyst is responsible for ensuring that information assets are adequately protected by actively maintaining and improving the enterprise Information Security program. Develops and enhances security use...
Under the direction of the Manager, Information Security Operations, the Engineer III –Security Analyst will use subject matter expertise to give guidance, best practices, and support to business and technology stakeholders during the deployment of critical business and technology initiatives. Manag...
Analyzes security events, incidents, log data analysis to secure the information and systems, including but not limited to: Microsoft Windows Active Directory, financial business applications, network andmunications security monitoring, endpoint security tools and data loss prevention tools. Informa...
This involves assessing security controls and practices, analyzing security events and incidents, implementing security controls, configuring and managing security systems, conducting vulnerability scans and assessments, and performing various IT security-related tasks. Knowledge and experience in i...
Analyzes security events, incidents, log data analysis to secure the information and systems, including but not limited to: Microsoft Windows Active Directory, financial business applications, network and communications security monitoring, endpoint security tools and data loss prevention tools. Thi...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Security Engineer or Cloud Engineer, with a focus on public cloud security and network security required. Work closely with Cloud Engineers and Site Reliability Engineers to implement and manage advanced security technologies and tools on public cloud platforms, such as identity and access managemen...
The Analyst III – Compliance Program has expert knowledge and performs key Compliance Program activities of complex difficulty. Team Members in this position are responsible for contributing to and leading in the development and implementation of the Compliance Program through operational processes,...
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
We are currently bidding on a contract providing IT and Cyber Security services for the IT Division within the NSWC Corona Division, Corporate Operations Department, supporting the Command Information Office, Information Technology Operations, Information Management Customer Services and Cyber Secur...
Business Intelligence Developer & Analyst - Compliance. Business Intelligence Developer to join our Compliance Operations team to lead compliance focused analytics on multiple campaigns. Fully manage multiple campaigns and clients by serving as the lead for all compliance and operational reporting; ...
For the IT Security Unit in LAUSD's Information Technology Division, a Cyber Security Engineer II analyzes, installs, operates, and maintains a variety of cyber security controls and tools and performs cyber security operational tasks such as managing security incidents, functional reviews, validati...
The Cybersecurity & Compliance Analyst will play a key role in driving the strategy, planning, implementing, monitoring, and managing security measures and compliance for the protection of controlled unclassified information (CUI), federal contract information (FCI), computer networks, and IT infras...
One or more of the following professional certifications Qualified Security Assessor (QSA), Certified Information Systems Auditor (CISA), Certified Information Systems Security Professionals (CISSP), Certified Information Security Manager (CISM), Certified Information Privacy Professional (CIPP), GI...
Proven track record in industry solving real-world problems as a Machine Learning Engineer, Data Scientist, Data Engineer, or similar role. Tech Lead (Edge Security Background). Develop machine learning solutions tailored to specific challenges within C-V2X connected car domains, focusing on areas l...
Hold a Bachelor's degree in Computer Engineering, Computer Science, or Electrical Engineering. ...