A successful candidate will have excellent technical skills focused in the security operations space, impeccable soft skills, and be a well-organized, self-directed individual with familiarity working for a service-based information security organization. Our client is looking for candidates to supp...
Assignment: IT Information Security Analyst Category/Level: Category F, Level Term of Assignment: months Date Candidate Resumes due to Sound Transit: Rate Range: General Summary: Under general direction, the Information Security Analyst assists with the operations of the Agency's Information Securit...
Identifies security risks and exposures, determines the causes of security violations and suggests procedures to halt future incidents and improve security. Develops techniques and procedures for conducting cybersecurity risk assessments and compliance audits, the evaluation and testing of hardware,...
Candidates for this role must understand how NAV solutions round out capabilities and processes within the security operations center (SOC) and the availability of managed security services (MSS) to gain access to additional security expertise, increase security detection and response capabilities, ...
Computer Skills: A strong aptitude for utilizing the computer to collect, organizes, and presents technical data through the use of relational databases. Communication Skills: As a member of an Engineering Automation team, communicate with other data analysts, engineers, technical experts, and manag...
Strativ is hiring for Staff Security Engineer to join AI start-up who have won numerous awards for their platform over the past 12 months. Demonstrate empathy, collaborative skills, and a continuous learning attitude, effectively working with engineers at all levels to integrate security into the pr...
The ideal candidate is someone with 2+ years of experience working within a law firm in a legal risk or compliance role. Coordinate with Legal Department Analysts to certify that department objectives are met. Research complex litigation cases using a magnitude of resources (S&P Global corporate dat...
Demonstrated experience with data pipelines, data cleansing, data transformations and other analytical techniques for data manipulation. As a Data Analyst on our client’s team, you will build dashboard and analytics solutions using Microsoft’s Power BI. Manipulate and analyze complex, high-volume, h...
As an Information System Security Engineer (ISSE), you support a variety of projects which draw from your wide spectrum of technical experience. Partner with engineers to interpret security requirements and plan effective control implementations. Experience with information security fundamentals and...
Keywords: business analyst, washington DC, arlington, alexandria, maryland, virginia, business, analysis, visio, MS, MS project, JIRA, powerpoint, power point, data, excel, requirements gathering, documentation, project management, planning, capture, PMP, certification, tracking, SCRUM, business sys...
As the IT Business Analyst Manager, you'll lead a dynamic team of IT professionals dedicated to aligning agency programs with innovative IT solutions. Oversee business analysis activities across the department, ensuring solutions meet business needs and comply with state and federal regulations. I h...
Working within Tacoma-Pierce County Health Department, Admin Division, Business Technology Team,the Business Analyst will collaborate across technical and non-technical teams to gather requirements, assure that requirements are correctly understood by staff, assure user training, and change manageme...
We're looking for an Industrial Security Specialist who will play a crucial role in supporting workflows encompassing physical security, personnel security, and program support. The Industrial Security Specialist will partner with our FSOs and broader Industrial Security Team to plan for the future ...
Security Engineer II, Offensive Security Penetration Testing. This is an area that requires solving the hardest engineering challenges to enable machine learning powered solutions for our customers. In addition to delivering critical software, you will draw from a deep and broad technical expertise ...
Work directly with engine product teams to provide timely configuration and data management services. Ensure enforcement of configuration and data management rules to meet customer requirements. Familiarity with product lifecycle management (PLM) and/or data management tools. ...
Business System Analyst role supports the Business by working with Business Management, Subject Matter Experts, Product Owners, Project Managers, Technical Leads and Developers to provide Business Needs Analysis, Requirements elicitation, Requirements elaboration and Use Case/Story development. Form...
The successful candidate will provide support to the Regional Overseas Security Manager and locally employed Security Manager, ensuing that effective systems are in place, to manage security emergencies and keep all staff aware of security regulations and compliance procedures. Regional Overseas Sec...
You are either a security-minded software engineer who has been building modern services using a microservice architecture in an agile development environment or a development-interested security practitioner who understands security best practices, but wants to get closer to development and enginee...
Work as part of a team reviewing and assessing Risk Management Framework (RMF) authorization body of evidence for classified information systems, to include System Security Plan (SSP), Security Control Traceability Matrix (SCTM), Continuous Monitoring Plan, Incident Response Plan, Access Control Pla...
StrongData analytical skills Google Analytics reporting and GTMexperience excellent communication skills and passion for utilizingdata to drive insights. Data Collection and Analysis: Collect clean and analyzedatasets from various sources. Data Modelingand Visualization: Develop and maintain data mo...
Government information security and federal contractor regulations, including Department of Defense Cloud Computing Security Requirements for Impact Level 6 Cloud Service Provider personnel, and facilitate compliance with other regulations such as FedRAMP High baseline, and requirements of certain f...
Are you passionate about delivering exceptional developer experiences with a shift-left approach? Adobe's application security team leads the charter of ensuring security is prioritized during product design. We identify security threats at Adobe scale and enable development teams to fix them before...
INTECON, LLC is seeking a highly motivated Data Analyst in Asset Management to join its team and provide analytical support for CISA’s Asset Management Program by managing data integrity, creating insightful reports, and supporting system processes with tools like Microsoft Excel and Power BI. Using...
Ensures data integrity and compliance by performing data cleansing, data audit and/or data validation. Ensure data integrity and compliance by performing data cleansing, data audit and/or data validation. Provides business process, system support and data quality governance through data coordination...
Experience documenting business workflows, change management procedures, and data quality processes, along with the knowledge and ability to develop and perform data manipulation, data cleansing, data analysis, and data anomaly detection. As a Senior Data Governance Analyst at BECU, you will have th...