SAIC has an immediate opening for a .Logistics Planned Maintenance System (PMS) team member.The candidate will be responsible for assisting with the development of system maintenance products and responding to fleet requests for assistance with existing maintenance procedures.The successful candidat...
This role requires an individual adept in all areas of cyber security, with particular skills in identifying, analyzing, and neutralizing advanced cyber threats, requiring proven experience with Azure and AWS cloud security. Conduct security awareness training with a focus on threat detection and re...
Implements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities. ...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
If so, we invite you to join our team at Merit Safeguard in Vancouver as a Security Analyst. Demonstrated expertise in a security analyst position or a similar field. Are you someone who has a deep interest in cybersecurity and protecting important assets. In this role, you will play a crucial role ...
Under the direction of the Manager, Information Security Operations, the Engineer III –Security Analyst will use subject matter expertise to give guidance, best practices, and support to business and technology stakeholders during the deployment of critical business and technology initiatives. Manag...
Knowledge and understanding of security engineering, system and network security, authentication and security protocols, cryptography, mobile, and web application security. Information Security Analyst (Penetration Testing). Every day, we combine in-depth knowledge of cybersecurity, technology, and ...
Data Entry: Enter findings from the gap assessment into the JBAZMC CTS Security Library Spreadsheet accurately and efficiently. Documentation Updates: Based on the gap assessment and effort analysis, update and create Security and IT documents, ensuring they meet organizational standards and require...
Under direction, the Senior Business Systems Analyst leads and participates in the work of staff in performing applications support in designing, implementing, and maintaining VTA applications and systems including VTA's Enterprise Resource Planning system, Electronic Documents Management System, an...
Facilitate meetings with business stakeholders and product management to help build project charters, business processes, and business process activities. Write detailed Acceptance Criteria in the form of Behavior Driven Development scenarios for User Stories that can be understood by business stake...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
Palo Alto Networks – The PAN-OS resource will have at least three years of experience assisting organizations with the design, implementation and support of enhanced cyber-security controls associated with the Palo Alto Networks firewalls, and to a lesser extent, Prima Cloud. Deploy controls needed ...
For the IT Security Unit in LAUSD's Information Technology Division, a Cyber Security Engineer II analyzes, installs, operates, and maintains a variety of cyber security controls and tools and performs cyber security operational tasks such as managing security incidents, functional reviews, validati...
Job Description: In this contingent resource assignment, you may: Consult on or participate in moderately complex initiatives and deliverables within Information Security Engineering and contribute to large-scale planning related to Information Security Engineering deliverables. Review and analyze m...
Conduct data analysis to identify or reconcile data differences among different platforms, including multiple international data lakes and sources, each containing source of truth elements that must be combined into a single authoritative global data platform. Assist with data validations in ongoing...
The Senior Compliance Analyst has advanced knowledge of the job area and technical systems and practices, and advanced technical skills and reporting abilities. Maintains the compliance FWA audit program, including schedules, standards, processes, reports and tools in close collaboration with Compli...
As a Security Operations Specialist, you will be a key part of our in-house operations center team, providing real-time monitoring of AI-driven security systems to safeguard our clients' homes and families. The Role | Security Operations Specialist. Advanced Security Monitoring: Oversee AI-driven su...
Business Systems Analyst to bolster our Source to Pay (S2P) tools and systems administration within our global strategic sourcing organization. BS/MS degree in a Business Administration, Information Systems, Computer Science, or a related field. ...
Derive functional and security concepts from cyber security requirements. Interpret customers’ cyber security requirements. Develop and review the system architectures for security. Communicate and coordinate security designs with IP teams and customer. ...
As a Cyber Security Engineer I, you will play a crucial role in analyzing, installing, operating, and maintaining cyber security controls and tools. Two years of recent experience in security device engineering for a large organization. Analyze, monitor, and correlate security events to detect and m...
You will perform duties for Information and Material Security, Personnel Security, Physical Security, including access control, Antiterrorism/Force Protection and Industrial Security. You will assist the Security Director and Senior Security Specialists with planning and implementing the Command’s P...
As the Information Security Governance Specialist, you will utilize your wide area of expertise in risk management, cybersecurity, vulnerability management, information security governance, incident management, security frameworks and other areas to provide security compliance oversight for the Harr...
They will collaborate with development, operations, and security teams to ensure seamless integration and deployment of enterprise-wide eQube PaaS containerized solutions. Collaborate with development, operations, and security teams. Ensure security best practices are followed in containerized envir...
Implements system security policies, and scans. Provides Cybersecurity reporting requirements to appropriate authorities. ...
Review, validate and enter data. Attention to detail: can identify errors and gaps in data. Ability to identify issues and come up with data-driven solutions. Ability to create visual representations of data in PowerBI. ...