As the Information Security Analyst 3, reporting to the CISO, the selected candidate will perform technically and lead the hands-on technical team in administering IT security tools, automation, and compliance standards. Arial, sans-serif"><span style="color:#002060">Develop ...
Security Analyst</b></div> <div><b>Location: Bellevue, WA</b></div> <div><b>Duration : 12+Months</b></div> <div><b>Keywords:</b> PM, Test Management</div> <div><b>Role Description: </b> </div&g...
Role/Title : Business Analyst (Risk and control/ Audit, Compliance). Professional Domain experience in one or more of the following areas: Audit, Compliance or Business Controls Information Security Infrastructure or Network Operations. ...
To manage a staff of data analysts; to develop complex reports and analyze company data including Corporate or client specific data; to serve as a technical resource for company staff on data analysis and benchmarking issues; to meet with clients on such issues as necessary; to provide training and ...
As the Information Security Risk Management Specialist, you will utilize your wide area of expertise in risk management, security frameworks, regulatory compliance, cybersecurity, vulnerability management, disaster recovery and business continuity planning, incident management, and other areas to pr...
The Associate IT Security specialist will assist with the completion of information security requirements and deliverables related to eDiscovery and Legal Hold requests affecting cloud and on premises identity and access management systems and data storage systems. Coordinates and documents security...
Contributes to maintaining the Ethics and Compliance risk assessments at the compliance risk, product, business process, or overall enterprise level. Responsible for supporting Ethics and Compliance CMS Analytics and Reporting. Serves as a liaison between Compliance, Information Technology, Line of ...
PRIMARY DUTIES AND RESPONSIBILITIES</span></span><br style="color:#000000; font-size:13px" /><span style="font-size:13px"><span style="color:#000000">Perform job responsibilities with minimal supervision</span></span><br styl...
Data Analyst-Risk will be responsible for leveraging data and analytics to assess, monitor, and mitigate risks within the organization. Define data governance standards and processes to ensure data quality, integrity, and consistency. Ensure business users are enabled with carefully curated data vis...
Security Operations Center (SOC) Engineer. We invite you to challenge your expertise and augment your professional journey by joining our adept Security Operations Center team. Remediate vulnerabilities to improve overall security. Maintain SOC-related infrastructure for effective cybersecurity oper...
Monitor the data exchange with our external and internal data consortiums and the effectiveness of risk mitigation tools including internal controls. Do you bring a data-oriented and agile mindset to your work? Do you have a self-starter attitude that is constantly driving improvements without direc...
Performs modeling of data sources and flows, works with data management staff to define an operational framework that will define, develop and implement policies and security frameworks to ensure precise and secure delivery of knowledge and information. Perform modeling of data sources and flows, wo...
Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, Computer Security, or Information Technology – or equivalent applied experience. This includes participating in working groups, design reviews, and formal Risk Management Framework (RMF) and National Security Agency (NSA)...
The Identity & Access Management Senior Security Engineer is responsible for acting as resource, leader, and peer coach with other engineers in the development, testing, implementation, and integration of Identity and Access Management systems and solutions. Experience working within an information ...
Currently, we are looking for an SOC Analyst/Security Systems Engineer who has a high level of technical expertise in network and IT infrastructure security and is able to maintain a vigilant approach to protect their systems and data from an ever-increasing cyber-security threat. Monitoring the ove...
The System Security Engineer candidate is responsible for ensuring that cyber security requirements are properly defined, decomposed, allocated, implemented, and assessed to produce a cyber-resilient security design solution for the target platform (Air System or Weapon System). This includes partic...
HRS Business Analyst is also responsible for ensuring process and system integration across the breadth of HR functional activities and to preserve confidentiality of sensitive associate and business data. Lead, coach and develop HRS Business Analyst and HRS Specialist as needed to accomplish busine...
A minimum of 3 years of experience in Security Engineering. As a member of the Security Operations Team, the candidate will work in close coordination with their direct manager to pinpoint potential use cases and generate metric reports. ...
This job consults with cross-functional groups and levels to identify data and analytical needs, conduct analyses, review analyses and findings with leadership, facilitate related process/data improvement efforts, and develop executive level presentations. Develop and implement data collection syste...
Conduct data analysis to identify or reconcile data differences among different platforms, including multiple international data lakes and sources, each containing source of truth elements that must be combined into a single authoritative global data platform. Assist with data validations in ongoing...
The ISSE employs best practices when implementing security requirements within an information system including software engineering methodologies, system/ security engineering principles, secure design, secure architecture, and secure coding techniques. Lead a team of System Security Engineers and C...
Applies basic knowledge of compliance, business, analytical, and communication skills to support compliance programs and processes that promote compliant and ethical behavior, meet regulatory obligations, and prevent, detect, and mitigate compliance risks. This position will focus on compliance with...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
As a Classified Cyber Security/Information Systems Security Officer (ISSO) you will join the Classified Cyber Security Team supporting Department of Defense (DoD) programs to ensure classified information systems meet cyber security requirements and government directives. Participate in planning and...