Responsibilities:Act as a central Information Security point of contact for the Commercial line of businessCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Desig...
As the ideal candidate, you will support the Security Architecture team in implementing the Security Architecture Strategy and Framework across the enterprise. Strong knowledge of key Information Security technologies and the ability to apply them effectively. JCW Group is partnering with a financia...
Responsibilities:Act as a central Information Security point of contact for the Commercial line of businessCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Desig...
Technical proficiency across cloud platforms (AWS preferred), virtualization, networking, security, and SaaS solutions. ...
Responsibilities:Act as a central Information Security point of contact for the Commercial line of businessCoordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Desig...
As the ideal candidate, you will support the Security Architecture team in implementing the Security Architecture Strategy and Framework across the enterprise. Strong knowledge of key Information Security technologies and the ability to apply them effectively. JCW Group is partnering with a financia...
Desired Security Certificates: Security+ from CompTIA, GIAC Security Essentials (GSEC), Certified Ethical Hacker (CEH), or other related Information Security certificates. Security skills and tools: Carbon Black, Symantec Endpoint Protection, Imperva, Varonis, Tripwire, Forescout, Symantec Cloud Acc...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Collaborate with IT and security teams to ensure compliance with security policies. Proficiency in Microsoft security technologies and tools, including Purview Information Protection, DLP, data lifecycle management, records management, and Azure data governance. Our focus is Microsoft's six go-to-ma...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Bachelor's degree and at least 4-6 years of cybersecurity experience supporting Security Operations or Information Security teams. The Information Security Engineer will be responsible for supporting, configuring, and deploying security solutions that protect the business, but also allow the busines...
This includes the management and oversight of the following functional areas: Security Architecture/Strategy, Security Operation Center, Security Engineering, IAM, Application Security, Governance, Risk, Compliance and the eCommerce/Fraud teams. Specifically in the areas of security architectures an...
Information Security Systems Engineer. Applies current Systems Security Engineering methods, practices, and technologies to the architecture, design, development, evaluation, and integration of systems and networks to maintain system security. Works closely with Government customers to ensure that t...
Communications: Providing effective internal and external communications that drive engagement and understanding of Information Security Office initiatives and AIG’s overall information security program. Collaborate with project teams across the Information Security Office to develop and execute com...
Defines, implements, and applies area-wide security and/or COB policies and standards by leveraging in-depth knowledge of globally accepted information security and/or COB principles. Senior Vice President, Information Security. Senior Vice President, Information Security. Senior Vice President, Inf...
Communications: Providing effective internal and external communications that drive engagement and understanding of Information Security Office initiatives and AIG’s overall information security program. Collaborate with project teams across the Information Security Office to develop and execute com...
Information Security Engineer - GRC. Conduct or oversee regular security audits and assessments to evaluate the effectiveness of cybersecurity controls and identify areas for improvement. This person will be responsible for developing, implementing, and overseeing the organization's comprehensive cy...
The Information Security Specialist takes a lead role in ensuring the security of all protected information collected, used, maintained, or released by Stevens. Updates security controls and provides support to all stakeholders on security controls covering internal assessments, regulations, protect...
This includes the management and oversight of the following functional areas: Security Architecture/Strategy, Security Operation Center, Security Engineering, IAM, Application Security, Governance, Risk, Compliance and the eCommerce/Fraud teams. Specifically in the areas of security architectures an...
Knowledge and understanding of security engineering, system and network security, authentication and security protocols, incident management. Collaborate with business units and corporate partners to ensure solutions are built in consistent with the organization's policies, programs, architectural r...
Expected to contribute to all System Security Engineering activities pertaining to CDRLs, trade studies, security requirements analysis, secure architecture development, management & compliance with security controls, design review milestones (SRR, SDR, PDR, CDR) and security test/verification a...
Partner with the business and security team to ensure security standards are followed, enforced and components delivered to improve security are implemented with high quality. Lead strategic initiatives to implement, maintain, and enhance AIG cybersecurity posture through IT Security Business Servic...
The Open Group Architecture Framework Certification (TOGAF), Certified Information Security Professional (CISSP), Certified Information Security Manager (CISM), etc. The Principal Information Security Architect – Enterprise Technology serves as the most senior security architect and advanced technol...
You will help develop a culture of security awareness across the company, educating teams and individuals on Information Security principles and best practices. Technology - Information Security. As a Senior Associate, Information Security Operations. Information Security Awareness and Delivery. ...
Utilize technical domain expertise in data management, information security, infrastructure or network operations to drive policy adherence and maintain sustainable risk based solutions. ...