As a Senior Cyber Security Officer (Fusion) you will support our Mission Fusion Operations Manager to summarize and provide consolidated operations updates working with Threat, Vulnerability, Host Based Security, and Watch operations teams. Find even more open roles in Ethical Hacking, Pen Testing, ...
Example: Microsoft security patching, updating appliance firmware, maintaining Cyber Security definitions, monitoring Anti-Spam solution, monitoring Cyber Security appliances, and recommending modifications to existing Cyber Security hardware, software, and overall security stance. IT infrastructure...
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. Chief Security Office (CSO) Cyb...
The Director of CyberCompliance will be responsible for enabling the broad growth of cybersecurity service offerings, while understanding industry specific cybersecurity risks, payment card security requirements, through assisting organizations with establishing an effective data protection program ...
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. We're Hiring a Director Of Cybe...
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. Cyber Security – Web Applicatio...
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. As a member of the Security, Pr...
Avertium is themanaged security and consulting provider that companies turn to when they want more than check-the-box cybersecurity. Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber S...
Must have 2 years of experience in Cybersecurity concepts and methods, including vulnerability assessments, data classification, privacy assessments, incident response, security policy creation, enterprise security strategies, architectures and governance. Must have 1 year of experience in Cybersecu...
Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. Sales Cyber Security Senior Man...
Manages the Cyber Security Awareness program, including LMS course content management, phishing assessment oversite, MAC compliance for associates and contractors, and ongoing cyber security awareness event coordination. Manager – Cyber Security & Privacy Governance to join our team. Strong backgrou...
We are seeking an experienced Sr Network Cyber Security Engineer with a broad background in all aspects of Security Technologies including Network, cloud, mobile and application to ensure the availability and accessibility of data is provided to our customers, but equally meaningful, is protected fo...
Career Opportunities: IS Epic Administrator - Security Analyst (24318). IS Epic Administrator - Security Analyst. Configure the Epic system according to the specific needs of the healthcare organization, including clinical workflows, user access levels, and security measures. Ensure the Epic system ...
Maintain Export Compliance order entry approval queue and support Order Management team with export compliance escalations. The Global Trade Compliance (GTC) Export Specialist has primary responsibility to report exports in a timely manner to the Department of Commerce Census Bureau. The position re...
The Information Security Analyst II position implements and maintains security solutions to protect CareOregon computer networks and data from cyberattacks. Career Opportunities: Information Security Analyst II (24290). Information Security Analyst II. Research and evaluate products and vendors; pre...
ERR_DATA_EXPECTED:"(expected {0})",ERR_DATA_FORMAT:"{0} is invalid {1}",ERR_DATA_OUT_OF_RANGE:"{0} out of range ({1} - {2})",ERR_DATA_REQUIRED:"{0} is required {1}",ERR_DATA_TOO_LONG:"{0} is too long ({1} characters exceeds the maximum of {2})",JOBREQ_RTE_FIELD_KEY:"Field Key",JOBREQ_RTE_FIELD_LABEL...
The Team Member will be an integral part of the Allspring Regulatory Compliance team supporting the Allspring Global Investments Compliance Program activities including managing the firm's books and records requirements, leading the information barrier compliance oversight process, coordinating inte...
The Compliance Analyst will primarily support the centralized Compliance monitoring program for Allspring Global Investments by performing testing, monitoring and other Compliance program related activities. Allspring is looking for a Compliance Analyst that will be an integral part of the Allspring...
Security Officer healthcare certification (CHSO) issued by the International Association for Healthcare Security and Safety (IAHSS) needs to be obtained within 2 years, an. Delivers security awareness education to team members to leverage their assistance in the overall security of the site. May ser...
As a Trade Compliance Analyst II, you will oversee the import/export audit programs and implement company initiatives based on those results, while maintaining compliance with all relevant regulations and customs laws. Customs Compliance Continuous Improvement and Control - ability to recognize impr...
DUTIES: Meet with Manager for further instructions.Start Shift" and "End Shift".Start Break" and "End Break" immediately....
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
Reporting into the Chief Compliance Officer of Allspring Funds Management, LLC, the Senior Compliance Analyst will primarily support the Compliance program functions of Allspring's retail managed accounts business. The Senior Compliance Analyst will provide oversight and challenge to business compli...
Understanding of a wide-range of cybersecurity capabilities including data security, security engineering, identify & access management, incident response, logging & monitoring, and penetration testing. We're looking for self-motivated and self-driven engineers who are passionate about what ...
We're looking for self-motivated and self-driven engineers who are passionate about what they do and love cybersecurity. You will work in an agile and innovative environment, solving complex problems and collaborating with architects and engineers to ensure the safety and security of Northwestern Mu...