Chief Technology Officer, VP of IT, Director of IT, VP of IT Operations, Director of IT Operations, Chief Information Officer, IT Manager, IT Consultant, Chief Data Officer, Chief Security Officer, Technology Manager, IT Operations Manager, Information Systems Manager. Legal, Information Technologie...
As a Senior Consultant in our Cyber Application Security team, you will be part of our SAP practice and will be responsible for delivering SAP ECC and S/4 HANA security implementations and assessments. SAP Security and GRC Access Control Senior Consultant. Join our Cyber & Strategic Risk Applica...
Technology Consultant - Cyber Security - Identity & Access Management (IAM) (Manager)(Multiple Positions) ([redacted]), Ernst & Young U. Assist clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enforcin...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Senior Manager, Information Security Office (ISO) Consultant. The Senior Man...
SAP Platform Security professionals develop and deliver solutions - including design and implementation of SAP Security Roles, Segregation of Duties Analysis Rules, Security Role Provisioning solutions, Security Workflow, Business Process Controls, Security Analytics, Enterprise GRC Solutions, Autom...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Manager, Information Security Office (ISO) Consultant. Influence customers t...
We are seeking a Senior Physical Security Consultant/Protective Engineer in the Northeast, Mid-Atlantic, West or Southwest states, but other TRC office locations in the lower 48 states may be considered for this position. Conduct security assessments and develop security standards/specifications, ma...
You Are:A Security and Risk professional specializing in application security and modernization, focused on updating and transforming existing applications to cloud-first models, enhancing their resilience against evolving threats. Demonstrate deep knowledge in application security with a focus on s...
Technology Consultant - Cyber Security – Identity & Access Management (IAM) (Manager)(Multiple Positions) (1506970), Ernst & Young U. Assist clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enforcing business,...
Our Security, Risk and Compliance consultants work with clients at all levels of the organization, from the C-suite to the shop floor, helping them to deliver on their most strategic initiatives. Management or participation in Cybersecurity, Information Security, Risk, Compliance and/or Data Privacy...
As a Senior Consultant in our Cyber Application Security team, you will be part of our SAP practice and will be responsible for delivering SAP ECC and S/4 HANA security implementations and assessments. SAP Security and GRC Access Control Senior Consultant. Join our Cyber & Strategic Risk Application...
We are seeking a Senior Physical Security Consultant/Protective Engineer in the Northeast, Mid-Atlantic, West or Southwest states, but other TRC office locations in the lower 48 states may be considered for this position. Conduct security assessments and develop security standards/specifications, ma...
Technology Consultant - Cyber Security – Identity & Access Management (IAM) (Manager)(Multiple Positions) (1506970), Ernst & Young LLP, Boston, MA. Assist clients in aligning security management strategy with business goals by managing who has access to which resources and services, as well as enfor...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Center 3 (19075), United States of America, McLean, VirginiaSenior Manager, ...
Lead Security efforts and Single Sign-On (SSO) integrations for security and access automations. ...
Coordinate and execute proactive Information Security consulting to the business and technology teams covering Infrastructure Security, Resiliency, Data Security, Network Architecture and Design, and User Access Management. Center 3 (19075), United States of America, McLean, VirginiaManager, Informa...
Abacus Technology is seeking an Information Security Analyst to support security and information assurance activities for Hanscom AFB. Plan, implement, upgrade, or monitor security measures for the protection of computer networks and information. Ensure appropriate security controls are in place tha...
Bachelor of Science (or equivalent experience) in Cybersecurity, Software Engineering, Computer Science, Computer Engineering, or related engineering disciplines and 5 years of related experience in defensive cybersecurity operations, cyber incident response, analytic development, capability develop...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. The Airborne Battle Management and Command and Control (ABMC2) department is seeking a skilled systems engineer with expertise in a...
The R&D centers we operate for the government create lasting impact in fields as diverse as cybersecurity, healthcare, aviation, defense, and enterprise transformation. Our AI-enhanced Discovery and Decisions department has a need for an Artificial Intelligence Biometrics Engineer with a passion for...
Chief Technology Officer, VP of IT, Director of IT, VP of IT Operations, Director of IT Operations, Chief Information Officer, IT Manager, IT Consultant, Chief Data Officer, Chief Security Officer, Technology Manager, IT Operations Manager, Information Systems Manager. Legal, Information Technologie...
Accountant, Accounting Clerk, Accounts Payable Specialist, Accounts Payable Administrator, Accounts Payable Manager, Billing and Collections Analyst, Billing and Collections Coordinator, Billing and Collections Manager, Bookkeeper, Chief Financial Officer, Controller, Comptroller, Credit Analyst, Fi...
Interacting with developers, analysts, security analysts, and technical and non-technical business teams to determine use cases and business processes for roles, entitlements, provisioning and de-provisioning. Bachelor's Degree in Information Security, Cyber Security, Information Assurance, Computer...
Chief Data Security Officer, Chief Data Officer, Chief Digital Officer, Chief Privacy Officer, CIO, Chief Security Officer, Chief Risk Officer, VP of IT Security and Privacy, VP of IT Infrastructure, VP of IT Operations, VP of Cybersecurity, VP of Risk Management, VP of Data Privacy, VP of Privacy C...
Accountant, Accounting Clerk, Accounts Payable Specialist, Accounts Payable Administrator, Accounts Payable Manager, Billing and Collections Analyst, Billing and Collections Coordinator, Billing and Collections Manager, Bookkeeper, Chief Financial Officer, Controller, Comptroller, Credit Analyst, Fi...