Cloud security, threat hunting, auditing, ensuring compliance, assisting in various projects, presenting on Information Security concepts, and assisting in policy/procedure development. This role will conduct IT/Cyber Security investigations (hands-on work), as an individual, self-managed investigat...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Data Governance Security Analyst. Implement data security policies and establish compliance processes to protect data from unauthorized access, use, and cyber threats. Bachelor’s degree in Information Systems, Information Technology, Data Management, Cybersecurity, or other equivalent experien...
The Security Analyst will support T-Mobile's DCI (Domestic Communications Infrastructure) asset management inventory. Process mapping, documentation, and improvement experience (system security plan). Develop and test formal security controls. In partnership with coworkers, evaluate complex tech...
Knowledge of security principles, standards, and processes, such as authentication and access control, infrastructure hardening, network traffic analysis, endpoint security, platform architecture, application security, encryption and key management, cloud security, etc. The Information Security GRC ...
Our Cybersecurity team is searching for a CSOC Analyst to join us in taking the next big leap forward with our team. This role in T-Mobile's 24x7 Cyber Security Operations Center (CSOC) is vital for ensuring the overall security systems, services, and information assets. Investigate and respond to s...
The Security Analyst role represents a unique opportunity for the right person to gain valuable compliance and technical experience while working in a cohesive team environment to defend, expand, secure, and support Upward Health’s cloud-based infrastructure. The ideal candidate will be a quick lear...
Information Security Analyst will support the Cyber Defense and Operations (CDO) programs including Security Operations Center (SOC), Incident Response (IR), threat monitoring, threat hunting, EDR management, and assist with cybersecurity assessment activities. The Information Security Analyst will ...
Three or more years of experience Business Analyst experienced, translating technical goals and requirements into real action for clients. Join the group that solves business challenges and enhances the way we work and grow. Analyze, plan, design, document and make recommendations to improve busines...
Three or more years of experience Business Analyst experienced, translating technical goals and requirements into real action for clients. Join the group that solves business challenges and enhances the way we work and grow. Analyze, plan, design, document and make recommendations to improve busines...
Three or more years of experience Business Analyst experienced, translating technical goals and requirements into real action for clients. Join the group that solves business challenges and enhances the way we work and grow. Analyze, plan, design, document and make recommendations to improve busines...
As our Marketing Data Analyst you’ll evaluate marketing data, identify gaps and present opportunities to improve digital, search, email and engagement channels across campaigns for its 17 campuses. Now you can turn your passion for statistical data analysis to help our team change lives through data...
The Security Officer maintains a secure environment for clients and employees at all times. Partner with Senior Security Officer and Management to deter theft, report missing assets, respond to emergency situations and implement Incident Management Programs procedures. Responsibilities include both ...
Monitor the data exchange with our external and internal data consortiums and the effectiveness of risk mitigation tools including internal controls. Do you bring a data-oriented and agile mindset to your work? Do you have a self-starter attitude that is constantly driving improvements without direc...
Essential Functions Implement high-availability and performant applications Participate in designing/leading the implementation of high-availability and performant applications to bolster Garmin's security infrastructure Engage in the design/implementation of advanced systems aimed at maturing Garmi...
The Federal Reserve System (FRS) National Incident Response Team (NIRT) has an immediate opening for an Intermediate SOC Analyst (Incident Response) position, reporting to a Senior Manager Information Security. This role will be a combination of SOC analyst (providing triage of potential security ev...
The role of a Target Security Specialist can provide you with the:. As a Target Security Specialist, no two days are ever the same, but a typical day will most likely include the following responsibilities:. The good news is that we have some amazing training that will help teach you everything you ...
The jobholder ensures the integrity of the master data and the processes to support the data quality as well as troubleshoot data issues. Functions as a master data knowledge resource by helping the business understand master data and the data workflow tools used to request adds/changes. Executes ma...
Partner with Workstream Product Owners, Business Process Leads and Business SMSs to develop UAT test scripts for business scenarios and coordinate UAT execution as well as ensure defects are triaged, tracked, and dispositioned using the testing tools and methods. Senior Business Process Technology A...
Associate degree in a field of electronics, electrical or computer engineering or related engineering field or equivalent work experience. From fire alarm installation and testing to security cameras and video surveillance, our tailor-made solutions deliver connection and protection. What you'll do ...
Essential Functions Implement high-availability and performant applications Design/implement systems to enhance the security of Garmin's Identity & Access Management Systems Develop/maintain tools to bolster the Identity and Access Management framework at Garmin Conduct thorough design and code revi...
The Professional Security Officer is responsible for the safety and security of the facilities they protect. This Security Professional patrols the facility or stands a post as instructed and serves as a general security presence and visible deterrent to crime and client rule infractions; detects su...
Perform detailed analysis of complex business process requirements and provide appropriate system solutions. Conduct workshops to collect business requirements. Map client business requirements, processes, and objectives. Proactively propose business process and system enhancements. ...
This position is under the direct supervision of the Account Manager or Branch Manager and is responsible for protection, safeguarding, and security of assets, personnel, customers and visitors to assigned sites. Ability to maintain safe environment for officers, clients, vendors and employees. Mili...
Design and implement required security measures to ensure integrity of Consolidated Communications infrastructure. Ensure compliance with the Company's security policy, procedures, and applicable laws and regulation (SOC, SOX, HIPAA, PCI,?etc). Perform maintenance of hardware and software operated b...