In this role, you will be working with MIS developers, Business Systems Analysts, Product and Operations. Ability to analyze information to determine actions, impacts and outcomes. Knowledgeable of the values and practices that align customer needs and satisfaction as primary considerations in all b...
IT Analyst to facilitate the seamless integration of technology with specific business processes. Experience as a Systems Analyst or a similar role. ...
IT - Information Security Analyst***. ...
One of the nation’s largest and most respected hospital management companies, .Universal Health Services, Inc.NYSE: UHS) has built an impressive record of achievement and performance.Growing steadily since its inception into an esteemed Fortune corporation, UHS today has annual revenue exceeding $.I...
Adhering to compliance policies/procedures and obtaining necessary information to clear KYC/CAMS/OFAC etc. ...
Job Title: Information ManagementAnalyst. ...
As part of a team of analysts, the Senior Information Security Analyst identifies; implements; maintains; and supports technologies designed to protect the confidentiality, integrity or availability of UHS and affiliates information systems. The Corporate Information Services Department is seeking a...
As the Technology and Operations Privacy, Information Protection (IP) Analyst, you will serve our customers and clients with excellence by accurately and efficiently managing system access requests on behalf of management. Additionally, you will simplify the customer experience by ensuring interacti...
Reporting to the Managing Director of Academics, the Student Information Systems Analyst (SISA) is responsible for collaborating with a variety of stakeholders to ensure that our information systems and related educational technology platforms consistently meet a high standard of quality. Work close...
Information Security Compliance Analyst - CISSP/CISA. We have been asked to recruit a credentialed, top-notch enterprise information security professional. ...
Bachelor’s degree in computer science, Cyber Security, Information Technology, Information Sciences, or equivalent educational or professional experience and/or qualifications. ...
Reporting to the Managing Director of Academics, the Student Information Systems Analyst (SISA) is responsible for collaborating with a variety of stakeholders to ensure that our information systems and related educational technology platforms consistently meet a high standard of quality. Work close...
Job title: Information Security Analyst</b></p> <p><b>Duration: 4+ months</b></p> <p><b>Location: Philadelphia, PA Fully Onsite</b></p> <p> </p> <p><u><b>Job Description :</b></u></p> <...
Within LM Space, the Victor Program Area is looking for a an experienced Full Stack Software Engineer, who’s willing to work in the office on a small team of high performing software engineers. Our amazing people are on a mission to make a difference in the world and every day we use our unique skil...
Within LM Space, the Victor Program Area is looking for a senior Full Stack Software Engineer, who’s willing to work in the office on a small team of high performing software engineers. Our amazing people are on a mission to make a difference in the world and every day we use our unique skills and e...
Our amazing men and women are on a mission to make a difference in the world and every single day we use our unique skills, talents and experiences to design and build solutions to some of the world’s hardest engineering problems. Echo Program area of the Space Security Division of Lockheed Martin S...
ISR domain and/or Space Security experience. Security Clearance Statement:. This position requires a government security clearance, you must be a US Citizen for consideration. ...
This includes understanding the steps involved in categorizing information systems, selecting, and implementing security controls, assessing risks, and monitoring security posture. The Space Security Division focuses on the critical needs for protection of space capabilities that are of national imp...
Work side-by-side with data scientists, machine learning engineers, mathematicians, physicists, and software engineers to accomplish the mission. Our amazing people are on a mission to make a difference in the world and every single day we use our skills and experiences to create, design and build s...
Succeeding at the above imperatives will require demonstrated network security engineering expertise in architectures and best practices to secure large scale, enterprise networks, as well as proven domain and practical experience in architecture, design, and engineering of computer networks with se...
The Business Analyst II plays an important role in the organization by performing several activities related to the company's business analysis functions. The Business Analyst II serves as the conduit between the business and the Information Systems software development team through which requiremen...
Reporting to the Director, Institutional Research, the Data Reporting and Query Analyst II is responsible for the production of both standard and customized data reports to support decision-making by various College constituents, including decisions related to student success, program review, and pl...
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
Joining Chubb's Security Endpoint Security Architecture team as a Security Engineer, you will be a key player in formulating, deploying, and upholding the security measures that protect our global company operations. Research, evaluate, and provide recommendations regarding security tools and produc...
Network Security Engineer to support our client in the utilities industry. Apply security control frameworks and architectural models, such as zero trust, to enhance network security operations, with a focus on industrial environments like ICS/SCADA/OT. The ideal candidate will be able to develop an...