If not credited toward education requirements, completion of military training in a relevant area such as JCAC (Joint Cyber Analysis Course), Undergraduate Cyber Training (UCT), Network Warfare Bridge Course (NWBC)/Intermediate Network Warfare Training (INWT), Cyber Defense Operations will be consid...
Interact extensively with HHSC internal organizational stakeholders, including CSOC Team, CSOC Team Leads and CSOC Management, Internal and Perimeter network teams, Application and Database administrators and developers. ...
Knowledge of computer networking concepts and protocols, and network security methodologies. The Pen Test Vulnerability Analyst candidate will support a rigorous testing schedule in collaboration with third-party Penetration Testers in support of customer requirements. Knowledge of network access, i...
Principal Business Analyst - Financial. Designs, Develops, Manages and Executes complex business processes and makes recommendations to improve and support business activities. Coordinates business analyst tasks on information technology projects and provide project team member guidance/support thro...
Business Analyst / Data Analyst - PBM. Business Analyst / Data Analyst. You will be working as a member of a project team functioning as a business analyst for a PBM client utilizing waterfall and agile methodologies. Be a supportive bridge between clients, project managers and technical personnel t...
Business Analyst / Data Analyst - PBM. Business Analyst / Data Analyst. You will be working as a member of a project team functioning as a business analyst for a PBM client utilizing waterfall and agile methodologies. Be a supportive bridge between clients, project managers and technical personnel t...
The Data Loss Prevention (DLP) analyst is responsible for identifying, monitoring, and protecting sensitive data across the organization. The DLP Analyst will work closely with various departments to develop and enforce data privacy and security policies and procedures. Monitor data transfers and sh...
The Security Identity & Access Management Analyst will provide provisioning for the Access Control Team as part of the Information Technology Department. As a Security Identity & Access Management Analyst, you will:. Responsible throughout the year to perform logical security reviews/audits, includi...
We are looking to hire a Senior Business Analyst to join our Professional Services Division. As a Senior Business Analyst, you will work on prestigious projects and closely work with the customer, project managers, developers, quality engineers, trainers, and other core team members to execute proje...
This person will be responsible for reading business process documentation in order to better understand the environment and architecture. ...
Data Analyst who can use data pulled from front-end and back-end platforms to provide meaningful insights that drive informed business decisions. This role requires working directly with the business function to understand its importance, pulling data, developing KPIs/Metrics, and delivering insight...
Experience with different methods for dealing with large, multi-dimensional data sets, including relational databases, SQL, and ETL. MUST HAVE BUSINESS ACUMEN BEYOND DATA ANALYTICS (SOME OPERATIONS EXPERIENCE PREFERRED). Understand system relationships for the Aftermarket/Manufacturing and related p...
Knowledge and/or experience in information security or cyber security including training and certifications such as Security+, CEH and CHFI is an added advantage. Job Title: Data & Security Analyst. Work with skilled information security professionals to translate the analyzed data into security act...
Bachelor’s degree in Electrical Engineering, Control Systems Engineering, or related field. Design, develop, and implement control systems for industrial automation, including PLC, DCS, SCADA, and HMI systems. Proven experience (5+ years) in control systems engineering, preferably within the industr...
Execute the cyber security portion of the self-inspection, to include provide security coordination and review of all system assessment plans. The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is ...
The Senior Network Engineer is tasked with administering and supporting the organization's data networks, including switches, firewalls, VPNs, MPLS, routers, and related systems such as network management, optimization, and monitoring tools installation. This role involves acquiring and customizing ...
The Business Analyst will formulate and define scope and objectives through research and fact-finding combined with an understanding of applicable business solutions and business requirements:. As part of a Data Science, Consulting Analyst and Robotic Process Automation team, the Business Analyst pl...
Security Software Engineer- STRONG Programmer with. Minimum of 4+ years of experience in security engineering. Experience with integrating log feeds from various sources into SIEM systems like Splunk and enable detective controls on critical security events. Collaborate with engineering and operatio...
Location: Austin, TX ( hybrid 3 days onsite ).Skill Sets Niche Skill Experience .Preference Selenium WebDriver No 2-5 Years Is Required.Database Technologies No 2-5 Years Is Required.Advanced Java No 2-5 Years Is Required.API Testing Automation No 2-5 Years Is Required.QA Automation No 2-5 Years Is ...
Participate in the preparation and maintenance of documentation, such as System Security Plans (SSPs), Security Assessment Reports (SARs), and Plan of Action and Milestones (POA&Ms). Collaborate with system administrators and stakeholders to resolve security-related issues and provide technical guid...
The successful candidate will be responsible for coordinating between L2/L3 Cisco and MS Teams Engineers and onsite staff, assessing project sites, and ensuring the successful implementation of network solutions across various locations in Texas. Proven experience as a network lead or foreman, parti...
We are looking for a highly skilled Junior Systems Administrator to join our dynamic IT team. This role does require helpdesk support duties that will vary based on need and is critical in ensuring the smooth operation, security, and reliability of our IT systems, enabling us to deliver exceptional ...
Develop and maintain comprehensive security-related documentation, including architecture diagrams, security requirements, and coding guidelines. Collaborate with third-party vendors and external security experts to assess and enhance the security posture of our software systems. Proven track record...
As a Cyber Security Engineer, you will be a key player in a supportive and collaborative environment, driving the company's security and compliance requirements. Tarvos Talent is seeking a seasoned Cyber Security Engineer to join a dynamic and rapidly growing company that is making waves in its indu...
As a Cybersecurity Analyst, you will play a crucial role in identifying, analyzing, and mitigating security threats. Key Responsibilities for the Cyber Security Analyst:. Preferred Qualifications for the Cyber Security Analyst:. Preferred Skills for the Cyber Security Analyst:. ...