NOT REMOTE, MUST HAVE A SECURITY CLEARANCE. MoveAmerica is seeking a highly skilled and experienced Financial Analyst to provide comprehensive financial analysis and support to the DoD Office of Small Business Programs, specifically assisting with the execution and management of Mentor Protégé Progr...
EPIC Cadence Security Applications Analyst. Position: EPIC Cadence Security Applications Analyst (Job Id - #. Under the direction of an Application Manager, the Application Analyst performs troubleshooting, maintenance, and optimization of existing software applications. The Analyst must achieve in-...
Information Security Analyst - Audit and Compliance (Onsite & Remote (hybrid) working schedule required)101 Truman Medical Center. Works with contracted technology solutions providers to validate security risk assessments on new applications, equipment, or systems under review for adherence to secur...
Develops security policy to comply with security requirements as defined by the customer and provides input to the customer as requested when the customer develops security requirements. Evaluates security requirements and conducts feasibility studies to examine software requirements, administration...
The Analyst II Security position plans, develops, and administers cyber security procedures and training programs for classified or proprietary materials, products, services, electronic documents, and information systems. Plans, develops, coordinates, and presents cyber security awareness training a...
Cyber Security Analyst provides security guidance and expertise and performs and coordinates design, development, maintenance, and quality control functions on highly complex computer security projects. Develops security policy to comply with security requirements as defined by the customer and prov...
Key Management Services Analyst. Background in Help Desk or Network Command Center, emphasizing Information Security. Operate key management systems adhering to security protocols. IT Security, cryptography, and payment authorization systems. ...
Cyber Security Analyst provides security guidance and expertise and performs and coordinates design, development, maintenance, and quality control functions on highly complex computer security projects. Develops security policy to comply with security requirements as defined by the customer and prov...
The Security Analyst will be responsible for monitoring, investigating, correlating, and responding to cybersecurity alerts and incidents. The Security Analyst will plan, implement, upgrade, and monitor security projects for the protection of the JMARK"s internal and client computer networks and inf...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
The Analyst II Security position plans, develops, and administers cyber security procedures and training programs for classified or proprietary materials, products, services, electronic documents, and information systems. Plans, develops, coordinates, and presents cyber security awareness training a...
Plans, develops, coordinates, and presents cyber security awareness training and education for cyber security operations, evaluates training program effectiveness, conducts job task analysis, security audits, surveys, and special studies. Prepares and assures the implementation of cyber security pol...
Work closely with the Global Security Operations team members, Information Technology, business units, and management to implement and enforce security policies and procedures. Review new and existing systems to ensure baseline security requirements are met and to recommend security enhancements. Ha...
D Aceto Services LLC is seeking a motivated and detail-oriented Entry-Level Data Analyst to join our team. Help maintain data integrity and accuracy within databases. In this remote position, you will work closely with various departments to analyze data, generate insights, and support decision-maki...
The Business Systems Analyst II is responsible for using their knowledge of software programs and business acumen to provide detailed analysis to complex business problems. This individual will anticipate business needs and develop solutions to improve processes and functionality for our business. C...
Within the network space, you will be responsible for daily responsibilities involving configuration and connections, troubleshooting network and VPN problems, IP address auditing, establishing network environments by designing system configuration and installation, and maintaining overall network p...
We are building a Grants Compliance team who will be responsible for identifying compliance requirements during the grant award process and ensuring the requirements are met through the life of the grant. Create policy documents and bulletins to boil down required compliance activities, including co...
The role can also include a number of other activities, including security assessment and code review, internal tooling developments, community engagement, security hardening and feature development and industry collaboration participation. This is an exciting opportunity to join an industry leading...
In security risk management we're looking to harness the power of industry best practice combined with driving new innovation on how we do security risk assessments and modelling. Our security risk management team is the primary owner of the strategy and practices of how we identify, track and r...
This is a unique opportunity to use your software engineering and cryptography skills to build and maintain the security foundation that enables Ubuntu and its users to operate securely and remain compliant to international information security standards such as FIPS 140-3 and Common Criteria. Colla...
The Associate Provider Network Data Analyst plays a critical role in supporting cross-departmental communication and collaboration through data analysis and reporting. Data Interpretation and Reporting:. Analyze and interpret large datasets, and create visual reports to effectively communicate findi...
Perform defensive cyber operation duties including, but not limited to, ensuring workstation and server compliancy with Marine Corps McAfee Host Based Security System (HBSS) requirements; identifying cybersecurity incidents using HBSS, Tenable SecurityCenter, RedSeal, McAfee Security Information and...
You'll work with Application Development teams to identify application assets, data flows, threats, and required cyber security controls, as well as with Application Security Testers to measure the effectiveness of identified cyber security controls. Evaluate and implement security tools and automat...
Enforces information security policies and procedures by creating security reports; reviews information security policy documentation; and investigates possible security exceptions. Federal Reserve Bank of Kansas CityThe Federal Reserve Bank of Kansas City is seeking an Information Security Speciali...
We are building a Grants Compliance team who will be responsible for identifying compliance requirements during the grant award process and ensuring the requirements are met through the life of the grant. Create policy documents and bulletins to boil down required compliance activities, including co...