As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ECSA EC-Council Certified Security Analyst. Five (5) years of experience, specifically in a security analyst job for a computing infrastructure environm...
Business Analyst plays a critical role in supporting the business team by handling the configuration and home Office onboarding actions for our digital products. You will be a part of the Broadridge Advisor Solutions team using your business analysis skills to listen to clients and translate busines...
This job consults with cross-functional groups and levels to identify data and analytical needs, conduct analyses, review analyses and findings with leadership, facilitate related process/data improvement efforts, and develop executive level presentations. Develop and implement data collection syste...
Ensures data integrity and compliance by performing data cleansing, data audit and/or data validation. Ensure data integrity and compliance by performing data cleansing, data audit and/or data validation. Provides business process, system support and data quality governance through data coordination...
As Financial Business Analyst at Remedy, you will work on the Analytics & Product Innovation (API) Team, where you will work alongside other teams with a common goal of improving our products and staying ahead of market trends, while also doing our best to meet milestones and support API Team’s time...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Applies basic knowledge of compliance, business, analytical, and communication skills to support compliance programs and processes that promote compliant and ethical behavior, meet regulatory obligations, and prevent, detect, and mitigate compliance risks. ...
Perform detailed analysis of complex business process requirements and provide appropriate system solutions. Conduct workshops to collect business requirements. Map client business requirements, processes, and objectives. Proactively propose business process and system enhancements. ...
The incumbent delivers data profiling, conducts testing and systems validation to troubleshoot data anomalies, monitors data management metrics and data loads. This job understands healthcare data from end-to-end and analyzes raw data and analytic data for the enterprise. Verify analytic data for th...
To manage a staff of data analysts; to develop complex reports and analyze company data including Corporate or client specific data; to serve as a technical resource for company staff on data analysis and benchmarking issues; to meet with clients on such issues as necessary; to provide training and ...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
Assist in start-ups at new accounts to include: working the site, writing post orders and training checklists and training newly assigned permanent Security Officers. Frequently our Security Officers will provide customer service and information to a client’s employees and customers. Work special se...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
Uses regular judgement and discretion to collaborate with customers in order to: Understand capability needs; Gather project specifications; Create business cases and cost sheet analysis; Translate high-level business needs into detailed requirements for new capabilities (and change request/enhancem...
This Information System Security Officer (ISSO) position will support the Information System Security Manager (ISSM) in developing, maintaining and overseeing the cybersecurity of assigned F-35 systems at. Lockheed Martin is a Cyber Security pioneer, partner, innovator and builder. Ensuring all appl...
The Business Analyst gathers, interprets, and uses complex data to develop actionable plans to improve processes and desired results. In addition, the Business Analyst will assist the center store team with day-to-day duties and responsibilities including reporting and analytics, merchandising suppo...
Business Analyst, with a focus on business process modeling and business requirements documentation . Business Analyst will support our Salesforce CPQ implementation teams and help our teams meet business needs with an organized, proactive approach. BA - Business Process Modeling and Salesforce Spec...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
Conduct site security assessments at mills and woodyards, assessing security and effectiveness of physical controls to protect IP assets. Determine involvement with Corp Security, HR, Audit and Legal protocols to follow. Provide Fiber Security Consulting/Advice with Global Regions – share monitoring...