Strategic Management and Operations Analyst. Knowledge of computer networking concepts and protocols, and network security methodologies. DoD laws, regulations, and cybersecurity policies. ...
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Infor...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL:. ECSA EC-Council Certified Security Analyst. Five (5) years of experience, specifically in a security analyst job for a computing infrastructure environ...
Information Security Analyst - Direct Hire/Onsite. Innova Solutions has an immediate need for an Information Security Analyst onsite Birmingham AL. ECSA EC-Council Certified Security Analyst. Five (5) years of experience, specifically in a security analyst job for a computing infrastructure environm...
NET)Cloud computingSaaS modelsSecurity Information and Event Management (SIEM), Log analysis, Event collection & correlationIncident response and handlingTechnical writingPreference is for candidates to have at least two listed certifications:CEH Certified Ethical HackerECSA EC-Council Certified Sec...
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Infor...
As an IT Security Analyst, you will be an integral part of the backbone of the company, protecting computer networks from cyber-attacks, creating cybersecurity policies and practices for the entire organization, and documenting security breaches. Monitor security access, conduct security assessments...
Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Information Security Technologies, IT Environment, IT Standards, Procedures & Policies, IT Systems Management, Problem Solving, Software Security Assurance. Advises on more complex security procedu...
Five (5) years of experience, specifically in a security analyst job required. Valid driver’s license required The following certifications are highly preferred: CEH Certified Ethical Hacker ECSA EC-Council Certified Security Analyst. Plan, implement, upgrade, or monitor security measures to protect...
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. Analytical Thinking, Effective Communications, Information Assurance, Information Security Management, Infor...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
The System Security Analyst troubleshoots security related issues to mainframe, eCOS, inMotion, inMotion, and Supplier inMotion. The System Security Analyst handles all security questions in the form of Service Now Tickets, incoming forms, and calls. ...
Five (5) years of experience, specifically in a security analyst job required. ECSA EC-Council Certified Security Analyst. Plan, implement, upgrade, or monitor security measures to protect computer networks and information. Ensure appropriate security controls are in place to safeguard digital files...
NET)Cloud computingSaaS modelsSecurity Information and Event Management (SIEM), Log analysis, Event collection & correlationIncident response and handlingTechnical writingPreference is for candidates to have at least two listed certifications:CEH Certified Ethical HackerECSA EC-Council Certified Sec...
Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and the DoD Risk Management Framework and support full spectrum military cyberspace operations. Bachelor’s Degree in an...
Apply engineering knowledge of security solutions to design, develop and/or implement solutions to ensure programs are consistent with enterprise architecture security requirements and the DoD Risk Management Framework and support full spectrum military cyberspace operations. Bachelor’s Degree in an...
Access Control (AC), Building Architecture, Customer Solutions, Disaster Recovery Planning, Information Security, Network Security, Physical Security, Risk Assessments, Security Technologies. In collaboration with other members of the Security Policy and Compliance team, this role is responsible for...
Master Data Governance Analyst. You will provide training, tools, and guidance to empower teams to identify and resolve data quality issues, while also supporting our master data governance program and contributing to our compliance efforts. Support compliance efforts by ensuring that master data go...
As a Security Officer, you will serve and safeguard clients in a range of industries such as Commercial Real Estate, Healthcare, Education, Government and more. Allied Universal, North America's leading security and facility services company, provides rewarding careers that give you a sense of purpo...
In this role, you will work closely with attorneys and other legal professionals to ensure that RxBenefits continues to maintain our high standards for our compliance and privacy program. Track and assist with internal compliance and privacy incident investigations, including performing internal int...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
The Information System Security Engineer (ISSE) will be responsible for creating and maintaining RMF artifacts and shall implement security controls, patch vulnerabilities on network devices, and resolve system security engineering concerns to ensure cyber compliance and readiness for a Government F...
Education/Qualification Requirements Bachelors in computer science, computer engineering, cyber security, information systems, electrical engineering or related field required Advanced degree in EE, computer science or other related fields strongly preferred Experience in cybersecurity, including cy...
Must have great communication and hands on experience within Ficro Compliance Link and know how to read SQL queries. Our banking client is looking to bring on an Application Specialist who will run with the Ficro Compliance Link application. ...