A company is looking for a Security Operations Center (SOC) Analyst. ...
Essential ability to work independently with minimal oversight while collaborating with a team Ability to present information to a technical as well as a non-technical audience Ability to adapt to a fast-paced, demanding and dynamic work environment Excellent oral and written communication skills St...
A company is looking for an Early Career Information Security professional. ...
Our 13,000+ people are united in a shared purpose to pursue the limitless potential of technology and ingenuity for clients across defense, national security, public safety, civilian, and military health organizations. The SAP Labor Costing Functional Analyst will be at the forefront of optimizing l...
A company is looking for a Principal Security Analyst. ...
Information Security Analyst - Audit and Compliance (Onsite & Remote (hybrid) working schedule required)101 Truman Medical Center. Works with contracted technology solutions providers to validate security risk assessments on new applications, equipment, or systems under review for adherence to secur...
Key Management Services Analyst. Background in Help Desk or Network Command Center, emphasizing Information Security. Operate key management systems adhering to security protocols. IT Security, cryptography, and payment authorization systems. ...
KPMG is currently seeking a Senior Analyst to join our. ...
Develops security policy to comply with security requirements as defined by the customer and provides input to the customer as requested when the customer develops security requirements. Evaluates security requirements and conducts feasibility studies to examine software requirements, administration...
Must possess 3 years of experience in the following: (1) Gitlab or Jenkins CI/CD pipeline with Terraform integration; (2) Development coding skills with at least one or more of the following programming languages: JAVA, Python, Nodejs; (3) application development automation; (4) Google Cloudrun, Kub...
Cyber Security Analyst provides security guidance and expertise and performs and coordinates design, development, maintenance, and quality control functions on highly complex computer security projects. Develops security policy to comply with security requirements as defined by the customer and prov...
Educational Testing Operations Analyst. This is an opportunity to join a team of educational testing professionals working to set and enforce standards for national security professionals. That’s why we need you to join us as an Educational Testing Operations Analyst on our team, managing the delive...
We provide value to our customers and the organization by: Ensuring compliance with internal policies and external regulations; evaluating information system and application controls; educating BJC employees and other strategic partners on information systems security practices and concepts; acting ...
Requirements Must have the ability to receive / maintain a favorable adjudicated Public Trust investigation (US Citizen or Lawful Permanent Resident for at least 3 years) You have achieved a Bachelor’s Degree + 5 years of relevant experience with hands-on cybersecurity or system security ...
Completion of one of the following recognized professional certifications: QSA (Qualified Security Assessor), CISM (Certified Information Security Manager), CISSP (Certified Information Systems Security Professional), SSCP (Systems Security Certified Practitioner), Certified Ethical Hacker (CEH). Co...
Role - Oracle Cerner Security/User Access Analyst<br /> Location - St Louis, MO(Remote)<br /> <br /> <br /> Job Details:</b><br /> Works with stakeholders to document data needs, test data to ensure validity, map clinical data, and ensure interoperability of clini...
Bachelor's degree in Cybersecurity, Information Security, Intelligence or related discipline. The Insider Threat Analyst is responsible for detecting and mitigating risk from employees, contractors, vendors and partners who may intentionally or unintentionally harm the Firm. Collaborate with legal, ...
Capable of providing security solutions to the customer for complex security testing/risk requirement. BN USD WE’RE PRESENT IN 66 COUNTRIES OVER 1,400 ACTIVE GLOBAL CLIENTS Responsibilities : Should have implemented Security in CI / CD pipeline. Setup processes, Security Gate Checks configuration an...
Security/Remediation Analyst (App Sec) for a client in the STL area. Some of this security analyst responsibilities include:. Investigating security breaches and other cybersecurity incidents. Partnering with security teams to improve data quality in security tools and external reports. ...
Work closely with the Global Security Operations team members, Information Technology, business units, and management to implement and enforce security policies and procedures. Review new and existing systems to ensure baseline security requirements are met and to recommend security enhancements. Ha...
The Archibus IWMS Analyst will support our government client and will serve as a subject matter expert on the application, adaptation and integration of computer applications and associated data that are used in facilities management activities and functions of the client’s real property portfolio. ...
Join Team CARFAX as an IT Security Compliance Analyst. The IT Security Compliance Analyst is responsible for ensuring that the organization’s information systems and practices comply with applicable regulatory requirements, industry standards, and internal policies. This role involves assessing secu...
Plans, develops, coordinates, and presents cyber security awareness training and education for cyber security operations, evaluates training program effectiveness, conducts job task analysis, security audits, surveys, and special studies. Prepares and assures the implementation of cyber security pol...
Proactively partner local business and ABF security to manage Security Vulnerabilities across infrastructure. Investigate security breaches and other cyber security incidents. Help colleagues install security software and understand information security management. Coordinate User security complianc...