Monitor and analyze security events and alerts from multiple sources, including security information and event management (SIEM) software, network and host-based intrusion detection systems, firewall logs, and system logs. You will feed in to and drive internal service improvement processes and init...
The ideal candidate will have a strong background in business process analysis, change management, and cybersecurity compliance. Develop and execute change management plans to support the successful implementation of cybersecurity initiatives. Analyze current business processes related to cybersecur...
CSA III, CSA, CSA I, CSA II, Lead, team lead, Cyber Security team lead, TCP/IP, routing, Intrusion Detection Systems, IDS, Intrusion Protection Systems, IPS, Operating System, Database, Network, Application Security, Encryption, Cloud Security, Mobile Device Security, Data Loss, Prevention tools, Ri...
Job Title: Technical Security Analyst - Bug Bounty Program. Assigning vulnerabilities to appropriate teams: Once the vulnerabilities are prioritized, bug bounty triage analysts assign them to the appropriate teams such as development or security operations for remediation. Years of experience in sec...
As an Information Security Analyst, you will be responsible for safeguarding our customer's computer systems, networks, and data from potential security breaches, threats, and vulnerabilities. Symmetrio, a SoluStaff Company, is recruiting for an Information Security Analyst. You will analyze and ass...
Analyst is a member of a service team with upwards of four (4) personnel within the Information Security Operations group that are focused on data loss prevention (DLP), data aggregation/sharing monitoring, sensitive information management, cryptographic services, telemetry logging, and secure file ...
Responsibilities: Review and validate KYC documentation, mitigating risks for new prospects Respond to time-sensitive KYC requests from vendors and lenders Support compliance audits and perform quarterly security assessments Collaborate closely with the Compliance Director and key stakeholders Requi...
Required Skills 5+ years' experience configuring, deploying and maintaining and optimizing Azrue Security cloud native tools: Azure Senntinel including User and Entity Behavior Analytics (UEBA), and Security Orchestration, Automation and Response (SOAR) Azure Defender including Endp...
The Staff Security Engineer of IAM will be a product owner and lead engineer within Identity Access Management (IAM) space for CVS Health. This position will include leading multiple projects simultaneously and hands-on engineering of IAM solutions. Operating within DevOps and Agile frameworks as pa...
POSITION SUMMARY: The Tax Analyst assists with tax compliance and other tax related issues including tax return preparation. Assists field and corporate operations with various sales and use tax compliance and audits, personal and real property book expense and account reconciliations, unclaimed pro...
BlueVoyant is looking for Security Operations Center (SOC) Analysts to defend our global customers from the constant fight against adversaries. As an L3 analyst, you are the ultimate technical expert and escalation point for analysts on your team. You are the mentor for L1/L2 analysts, the trusted v...
As a Governance, Risk, and Compliance (GRC) Analyst, you will be responsible for supporting IT and Business personnel in meeting our Information Security and GRC objectives. This role will involve assisting in the implementation and maintenance of our technology GRC program, contributing to various ...
Responsible for supporting Coinbase’s internal audit plan through the execution of operational and compliance related audits from beginning to end. Audit, Risk, Compliance, Trade Operations or Management Consulting. Excellent understanding of an internal control environment and working knowledge of ...
Extensive experience & expertise across multiple security domains including cloud security, data security, network security, application security, incident management, threat/vulnerability/patch/configuration management, identity & access management. Are you ready for an exciting, unique &am...
Monitor incoming alerts and events from our Security Operations Center (SOC), analyze their significance, and investigate security incidents. Help develop and maintain information security policies and procedures. Educate employees and end-users about security best practices, policies, and procedure...
Currently, ManTech is seeking a motivated, career and customer-oriented Cyber Security Engineer for Salesforce Applications to join our team. Integrates new architectural features into existing infrastructures, designs cyber security architectural artifacts, provides architectural analysis and relat...
Collaborating closely with the Director of Information Security GRC, and stakeholders across the organization, the Information Security Analyst will be responsible for building and enhancing the GRC portfolio of efforts to raise the overall security and governance posture for Synopsys. The Informati...
A Cyber Security Engineer has IT experience with Cyber Security Policy and threat mitigation. Way Insignia Solutions has an opening for a Cyber Security Engineer to work in support of the Department of Veterans Affairs (VA), Office of Information & Technology (OIT), Office of Information Security (O...
Bachelor's degree or equivalent work experience (4 years of experience in lieu of Bachelor’s) in information systems/IT, IT audit, information security, or information risk management. IT, IT audit, information security, information risk management, or enterprise privacy that directly aligns with th...
This deeply technical role requires an individual with expertise in the life sciences sector, specifically with a sophisticated understanding of pharmaceutical use cases and extensive experience in working with, and analyzing, electronic medical record data, claims data, and lab data. Familiar with ...
This role performs operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning). The Associate Security Platform Engineer is responsible for detecting and monitoring es...
The main function of a data labeling analyst is to create and manage labeling and change processes within the data management systems. The typical data labeling analyst will have experience in data quality assurance. Excel (formulas, pivot tables, VLOOKUP's) or Google Sheets; analyze large sets of d...
As an Information Security Analyst at Juniper Square, you’ll have an opportunity to use your extensive knowledge and experience in all aspects of information security. You will have the chance to improve security tools and processes, identify threats and implement controls, and detect incidents and ...
This role performs operational security tasks such as performance and availability monitoring, log monitoring, security incident detection and response, security event reporting, and content maintenance (tuning). The Security Platform Engineer is responsible for detecting and monitoring escalated th...
The Senior Distinguished Engineer will be a part of the Network Protection Engineering organization focusing on shaping the network security agenda including the vision and capability growth across the domain. Distinguished Engineer - Network Security (Remote Eligible). This domain covers the enterp...