Complete an information system security course of instruction appropriate to level of responsibilities. Familiar with information system security architectural documentation standards. Able to apply information assurance / cyber security standards, directives, guidance and policies to an architectur...
Primarily responsible for API application security but with a good working knowledge of other security domains (Cryptography, Identity and Access Management, Threat and Vulnerability Management). Hands-on experience performing application API security assessment, static and dynamic security assessme...
The Security Analyst I is a key contributor in the development, implementation, and monitoring of a strategic, comprehensive enterprise information security program to ensure that the integrity, confidentiality, and availability of information that is owned, controlled, or processed by IPG. Collabor...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
As a L3Harris Senior Principal Cyber Engineer for L3Harris, you will lead multiple teams in support of cyber software capabilities development, integration, and testing in multiple disciplines including vulnerability research, embedded systems reverse engineering, CNO/CNE development, hardware emula...
L3Harris is currently seeking a Security / Vulnerability Research Engineer to join our team. This is an extremely exciting position working with National Security customers to protect and defend our nation. L3Harris Technologies is seeking the best of the best to support our Security Vulnerability a...
Perform detailed analysis of complex business process requirements and provide appropriate system solutions. Conduct workshops to collect business requirements. Map client business requirements, processes, and objectives. Proactively propose business process and system enhancements. ...
Peraton will deliver a broad spectrum centralized IT infrastructure, services, and processes to include Cybersecurity Task Order (CTO) compliance activities for the USSOUTHCOM networks to include three enduring Joint Task Forces (JTFs) and multiple Security Cooperation Office(s) (SCO). Peraton is se...
Business Analyst in Data Governance, MDM, and Data Quality initiatives. Collaborate with Data Stewards, Data Owners, and Business Units to ensure the enforcement of data governance policies and standards. Act as a liaison between business users and technical teams to document and communicate data go...
The Virtus CLO Compliance/Analytics Team handles the financial modeling, reviewing, and stress testing compliance models for collateralized loan obligations (CLOs) and similar transactions. The Senior CLO Compliance Analyst is responsible for ensuring models are developed, reviewed, and tested in ac...
Over 5+ Years of Business Analyst / Product Owner experience within an end user or consultancy environment. Design, create and support solutions to drive business processes in Salesforce that are secure and scalable. Bridging the gap between business needs and technical solutions. Stakeholder Commun...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
You'll be a member of the Content and Policy Analyst that define content standards and outline policy and inclusion criteria for our FCC and Trade Compliance business. You will support the management of our World Compliance data, specifically the maintenance and dissemination of our researcher-facin...
The position shall have the detailed knowledge and expertise required to manage the security aspects of an information system and, in many organizations, is assigned responsibility for the day-to-day security operations of a system. This also will include physical and environmental protection, perso...
In this Business Analyst role you will initially spend a significant amount of your days writing technical documentation and specs. Over the long term you will collaborate with development leads, account managers, and clients with the purpose of designing, building, documenting and testing solutions...
Maps raw customer healthcare data into standardized and custom formats and handle research on data issues and respond to data indicating opportunities for changes by providing detailed documentation of requirements for resolution. Responsible for configuration of assigned system modules, verificatio...
Cheney Brothers is looking for hard-working, motivated individuals to join our security team. ...
Define requirements modeling standards to include definition of business needs, how and when to reuse functional requirements, and business scope of non-functional requirements. Use exceptional knowledge of business analysis to create compelling presentations and influences business leaders to make ...
As the Information Security Risk Management Specialist, you will utilize your wide area of expertise in risk management, security frameworks, regulatory compliance, cybersecurity, vulnerability management, disaster recovery and business continuity planning, incident management, and other areas to pr...
We’re seeking a talented Business Analyst to drive data-based decision-making and operational efficiency. Bachelor’s degree in business administration, Finance, Economics, or related field; master’s degree or certification in Business Analysis is a plus. Proven experience as a Business Analyst or in...
The benchmark of American security has an immediate job opportunity for a Security Officer. As a Security Officer, you will conduct armed foot and/or vehicle patrol (interior and/or exterior), control access and egress, monitor CCTV and alarm systems, compose reports, deter criminal activity and mis...
A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy and that supporting documentation meets specified requirements. We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accura...
A Data Entry Specialist will compare data with source documents submitted by our members, checking for accuracy and that supporting documentation meets specified requirements. We are looking for a Data Entry Specialist whose main function is providing excellent customer service by quickly and accura...
Manage, train, and lead a team of security officers, ensuring they adhere to company policies and procedures. Provide ongoing training and support to security personnel to ensure high performance and adherence to security standards. The ideal candidate will possess strong leadership qualities, excel...
As a Security Officer - Rover/Patrol, you will play a crucial role in ensuring the safety and security of our clients' premises, employees, and assets. You will be responsible for conducting routine foot patrols to deter unauthorized access, maintain a visible presence, and respond to security incid...