Cybersecurity Analyst, Endpoint Health and Security – University Information Services. Cybersecurity Analyst, Endpoint Health and Security. The Cybersecurity Analyst understands that legacy and present-day systems and applications may have weaknesses that can be exploited by external threat actors a...
Prospect Information Analyst - Office of Advancement - Georgetown University. The Prospect Information Analyst interacts with colleagues at all levels, including program managers and OA executive staff in work that directly impacts the quality and quantity of known prospects within each client team’...
Experienced Business Analyst - Medicaid Claims. Help coordinate a business analyst team’s duties and activities on IT projects and nurture newer team members by providing guidance and support. Business Analyst position with 4-5 or more years of Medicaid and Medicare experience . Join the group that ...
Experienced Business Analyst - Medicaid Claims. Help coordinate a business analyst team’s duties and activities on IT projects and nurture newer team members by providing guidance and support. Business Analyst position with 4-5 or more years of Medicaid and Medicare experience . Join the group that ...
Business Analyst - Medicaid Claims. Business Analyst position with 2 or more years of Medicaid and Medicare experience preferred . Join the group that solves business challenges and enhances the way we work and grow. Analyze, plan, design, document and make recommendations to improve business proces...
Functionally reports to the Information Security Leader as part of the office of the Chief Information Security Officer (OCISO) to coordinate effort, solutions, and promote Security Practices. Partners and collaborates with Information Security staff and partners to leverage existing solutions and p...
Functionally reports to the Information Security Leader as part of the office of the Chief Information Security Officer (OCISO) to coordinate effort, solutions, and promote Security Practices. Partners and collaborates with Information Security staff and partners to leverage existing solutions and p...
Functionally reports to the Information Security Leader as part of the office of the Chief Information Security Officer (OCISO) to coordinate effort, solutions, and promote Security Practices. Partners and collaborates with Information Security staff and partners to leverage existing solutions and p...
The Business Systems Analyst (BSA) will work with business subject matter experts (SME's) and analysts to understand business requirements and objectives. Reviews, analyzes, and evaluates business systems and business requirements pertaining to rate, rule, or form changes to existing or new lines of...
A degree in Technology or Information Security, along with 5 years of progressive experience in Information Security. Overall, the Information Security Manager oversees comprehensive security measures, collaborates extensively, manages risks, educates stakeholders, and ensures adherence to security ...
The Business Process Analyst partners in the analysis, design, implementation, and maintenance of Finance business processes by streamlining and automating workflows, and establishing policies, procedures, documentation, and quality assurance guidelines. This role also coordinates Finance business p...
Analyze, troubleshoot, and investigate security-related, information systems’ anomalies based on security platform reporting, network traffic, log files, and host-based and automated security alerts. This role will be a focal point in the engineering of Information Security technology, procedures, a...
The Data Analyst is responsible for enhancing the quality of data products and services, analyzing data to inform business decisions and finding data and reporting solutions to meet business needs. This role serves as the liaison between the business and the data team (BI developers and Data Enginee...
JOB REQUIREMENTS: Senior Security Engineer - R4148 DESCRIPTION/RESPONSIBILITIES: Primary Duties and Responsibilities * Proven experience leading cybersecurity vulnerability management including identification, analysis, coordination, and remediation of vulnerabilities * Developing and managing vulne...
JOB REQUIREMENTS: Genesis10 is seeking a Data Analyst Consultant with our client in their Neenah, WI location. Staffing Industry Analysts for six consecutive years, Genesis10 puts thousands of consultants and employees to work across the United States every year in contract, contract-for-hire, and p...
Collects and analyzes data from multiple sources (including payer claims, EMR and other administrative and clinical data sources) for the development of reports and statistical information; determines the best format and design for reports and statistical information to be presented. Guides and part...
The Staff Security Engineer of IAM will be a product owner and lead engineer within Identity Access Management (IAM) space for CVS Health. This position will include leading multiple projects simultaneously and hands-on engineering of IAM solutions. Operating within DevOps and Agile frameworks as pa...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
The incumbent delivers data profiling, conducts testing and systems validation to troubleshoot data anomalies, monitors data management metrics and data loads. This job understands healthcare data from end-to-end and analyzes raw data and analytic data for the enterprise. Verify analytic data for th...
Experience with cybersecurity frameworks and threat methodologies, including the MITRE ATT&CK Matrix, CIS Critical Security Controls and NIST Cybersecurity Framework. Security certification required: At least one certification from Offensive Security or GIAC, including OSCP, OSCE, GCIH, GCIA, GC...
Requires experience providing top-tier support for 3 or more of the information security technology areas: 1) Access Control, 2) Application Security, 3) Business Continuity and Disaster Recovery Planning, 4) Cryptography, 5) Information Security and Risk Management 6) Legal, Regulations, 7) Complia...
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at. Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Ensuring all appl...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect - Healthcare Delivery Technology serves as the most senior security architect and advance...
Top Skills:*Virtualization experienceSecurity Processes – incident response, security awarenessSIEM tool experience would be a plus – Splunk, etcCulture fit/personality is very important – willingness to learn and curiousEducation and/or certification are not needed but a plus*Job Description:*Clien...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...