A company is looking for an Application Security Analyst in the Southeast region (Remote). ...
Requirements: Requires at least a Bachelor's degree, or foreign equivalent, in Applied Computer Science, Information Technology, Cyber Security, Computer Applications or related field and 5 years of progressive experience as a Software Engineer, Systems Analyst, Security Analyst, Information Securit...
A company is looking for an Information Security Analyst to support its information security program. ...
The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy. The SAM Analyst will rely on knowledge of Citi's SAM (Suspicious Activity Management) program to manage the assessment process and implementa...
A company is looking for a Security Compliance Analyst III. ...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
We are seeking a skilled Network Security Analyst Contractor to join our team in Irving, TX, for a 12-month contract. The ideal candidate will have prior analyst experience monitoring and configuring Palo Alto firewalls, Extrahop Reveal(x) network security monitoring tool, and Cloudflare. Develop, c...
CxSpFirst"><b>Technical Security Application Analyst - REMOTE WORK - 58445</b></p> <p class="wordsection1CxSpMiddle"><b>Pay Range - $45 - $50/hr</b></p> <p class="wordsection1CxSpMiddle">We have an immediate long-term oppor...
IT Security Analysts to join our team. Provide analysis and trending of security log data from a large number of heterogeneous IT security devices. Monitors and analyzes Early Detection/Response Systems (EDR) and Security Information and Event Management (SIEM) to identify security issues for remedi...
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Job Title: Cyber Security Analyst ...
The Principal Data Security Analyst, job focuses on gathering and interpreting data, gathering, and documenting business requirements, defining and documenting processes (process flows/swim lanes), and standardization of data and processes. Hands on experience with various Data Protection technologi...
SaaS Security Architecture and Design:. Equipped with the requisite knowledge to identify and manage security vulnerabilities across a wide range of SaaS applications (Google Workspaces, SalesForce, Workday, etc). Develop and maintain security documentation and best practices. Deploy, configure, and...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
As a Cybersecurity Analyst, you will play a crucial role in identifying, analyzing, and mitigating security threats. Key Responsibilities for the Cyber Security Analyst:. Preferred Qualifications for the Cyber Security Analyst:. Preferred Skills for the Cyber Security Analyst:. ...
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Job Title: Cyber Security Analyst ...
Cyber Security Engineer/Analyst with DLP Expertise. Cybersecurity Risk Management: Oversee the aggregation and reporting of cybersecurity risks from various sources like policy violations, stakeholder concerns, and operational exceptions. Consultation & Analysis: Consult on complex Information Secur...
Cyber Security analyst experience. The purpose of this position is to assure the security posture of the Switch Information System and Assets. Information Security Analysis of the entire Switch Information System. Provide management with status of security posture on a frequent basis. ...
The Senior Control Analyst will contribute to the team’s goals of ensuring a sound security posture by assessing the risk-based design of security controls and maturity of security capabilities. This role will support the identification, documentation, and formalization of security controls across t...
The Information Security Office’s (ISO) vision is to realize a culture of security that manages risks, defends against threats, and integrates information security into business and technology. Position : Principal IT Security Analyst IV. The Global Cyber Security (GCS) Team supports this vision thr...
What you’ll need to succeed as an Analyst, Information Security at XPO. Knowledge of the corporate cybersecurity threat landscape, cyber threats and vulnerabilities, system and application security threats and vulnerabilities and tactics and targets of Nation State actors and APTs. About the Analyst...
Information Security Analyst II. The Information Security Analyst II is responsible for safeguarding the company against intrusions, malware, threat actors, and assorted cyber threats. Assist the Information Security Team providing Tier 1 and Tier 2 support. Actively monitor and investigate security...
We are seeking a talented and detail-oriented Information Security Technical Analyst to join our cybersecurity team. The Information Security Engineer will work closely with cross-functional teams to identify and address security vulnerabilities and ensure the overall security posture of our organiz...
Are you a highly skilled and experienced security professional with a passion for incident response and operational excellence? If so, Nutanix is seeking a Senior Analyst to join our dynamic Security Operations Center team. The Senior Analyst will also act as a trusted Subject Matter Expert (SME) fo...
Tier 1 Security Operations Center (SOC) analysts; working collaboratively with multiple teams and personnel; working with other SOC analysts as well as subject matter experts within the larger distributed Cyber defense team including; cyber threat hunters, threat intelligence analysts and forensic i...
Work closely with the Information Security Governance and Compliance team and security leadership to ensure cybersecurity policies and practices are designed to help mitigate risk. Knowledge of IT systems, network security, application security, identity & access management, vulnerability management...