Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL:. If you would like to know a bit more about this opportunity, or are considering applying, then please read the following job information. ECSA EC-Counc...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ECSA EC-Council Certified Security Analyst. CISSP Certified Information Systems Security Professional. ...
Information Security Analyst - Direct Hire/Onsite Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL: This is a direct hire, onsite position Local candidates are needed to work onsite M-FMin of Bachelors degree required. NET)Cloud computingSaaS modelsSe...
As an IT Security Analyst, you will be an integral part of the backbone of the company, protecting computer networks from cyber-attacks, creating cybersecurity policies and practices for the entire organization, and documenting security breaches. IT security analysts are ultimately responsible for e...
TEMPORARY SERVICES: INFORMATION TECHNOLOGY, COMPUTER TECH, SYSTEMS ANALYST-(TEM000AA). Department is seeking individual with Accounting/Finance skills and heavy Information Technology skills. ...
Information Security Analyst - Direct Hire/Onsite Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL: This is a direct hire, onsite position Local candidates are needed to work onsite M-FMin of Bachelors degree required. NET)Cloud computingSaaS modelsSe...
Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and destruction. Maintain and protect sensitive and private information by kee...
Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Establish plans and protocols to protect digital files and information systems against unauthorized access, modification and destruction. Maintain and protect sensitive and private information by kee...
Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and the DoD Risk Management Framework and support full spectrum military cyberspace operations. Bachelor’s Degree in an...
Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and the DoD Risk Management Framework and support full spectrum military cyberspace operations. Bachelor’s Degree in an...
Strategic Management and Operations Analyst. Knowledge of computer networking concepts and protocols, and network security methodologies. DoD laws, regulations, and cybersecurity policies. ...
Azure Cloud Software Developer and Engineer. The Azure Cloud Software Developer and Engineer will be supporting the Cloud One Common Computing Environment (CCE) program under the Air Force Lifecycle Management Center Office for Network Integration (AFLCMC/HNI). Address security findings and vulnerab...
Medicaid data, Medicare data, Healthcare Exchange data or Commercial payer data. As a Data Analyst within the Optum Alabama Enterprise Data Services (EDS) team, you will be responsible for collaborating with the analytic business users to produce reports and develop analytics in an accurate and time...
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Infor...
Master Data Governance Analyst. You will provide training, tools, and guidance to empower teams to identify and resolve data quality issues, while also supporting our master data governance program and contributing to our compliance efforts. Support compliance efforts by ensuring that master data go...
In this role, you will work closely with attorneys and other legal professionals to ensure that RxBenefits continues to maintain our high standards for our compliance and privacy program. Track and assist with internal compliance and privacy incident investigations, including performing internal int...
The Business Analyst is responsible for the financial and management reporting, analysis, forecasting and budgeting processes for their designated Region Job Responsibilities. Regular travel to business sites is a requirement of this position. ...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Education/Qualification Requirements Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required Advanced degree in EE, computer science or other related fields strongly preferred Experience in cybersecurity, including cy...
Must have great communication and hands on experience within Ficro Compliance Link and know how to read SQL queries. Our banking client is looking to bring on an Application Specialist who will run with the Ficro Compliance Link application. ...
The Senior Information Security Engineer will be responsible for maintaining the security posture of the organization's infrastructure, collaborating with cross-functional teams, and ensuring the implementation of security best practices across all areas. We are seeking a seasoned Senior Information...
This person will be part of the Supply Chain organization and responsible for cleaning up data in Excel, working with vendors to collect / correct data in the internal system. Strong experience consolidating data in Excel and managing spreadsheets. Experience with data analysis. ...
The engineer will support cyber-physical security projects with power system and cyber modeling, simulation, and analyses to identify and characterize threats, and vulnerabilities and develop mitigation approaches. Bachelors in computer science, computer engineering, cyber security, information syst...