A company is looking for a Security Operations Center Analyst II to coordinate and report on cyber incidents impacting State, Local, Tribal, and Territorial governments. ...
Knowledge and/or experience in information security or cyber security including training and certifications such as Security+, CEH and CHFI is an added advantage. Job Title: Data & Security Analyst. Work with skilled information security professionals to translate the analyzed data into security act...
Key Responsibilities:Maintain and enhance the enterprise-wide IT Application and System Security Testing programConduct application and system vulnerability assessments and perform code reviewsAssist with incident response and contribute to security-related projectsRequired Qualifications:Minimum of...
The Senior Cyber Security Operations Analyst is responsible for 24x7 operation of the Cyber Security Operations Center (SOC), which involves providing real-time (or near real-time) detection and reaction services for information security incidents within the company. Knowledge of various security me...
A company is looking for an Epic Security Analyst IV to manage security protocols and processes in support of their Acumen line of business. ...
We are looking for a Data Security Analyst to join our team in the insurance industry, based in McKinney, Texas. Coach entry level analysts and assist them in their responsibilities. Excellent understanding of data security principles and best practices. Excellent communication skills to effectively...
Cyber Security Analyst responsibilities will include network security analysis, monitoring, and incident response, as well as maintenance and configuration of security tools. Security Analysts work with the latest technologies to detect, analyze, and limit intrusion and security events. We are looki...
The information security analyst will be required to effectively execute security processes enabled by security technologies and services. The information security analyst plays an integral role in carrying out the organization's security strategy, architecture, and practices. The information securi...
Title : Sr.Location : Cincinnati, OH or Remote (EST time zone).Duration : 6+ months.Candidates woul...
The Information Security Analyst is responsible for establishing and executing a portion of the Globe Life Information Security Program to provide information security services that support the reduction of business security risk. Routinely review documentation related to regulations, standards, and...
BRCO Business Unit Compliance Analyst. The Business Risk Control Office (BRCO) Business Unit Compliance Analyst for their respective Line of Business will be responsible to provide expertise on both the Line of Business and the specific rules, regulations and compliance laws impacting the Line of Bu...
CANDIDATE SKILLS AND QUALIFICATIONS.Candidates that do not meet or exceed the .Evaluate and review existing SIEM platform capabilities to determine current system state.Aspects include benchmarking of in use hardware, storage and virtualization features, evaluating overall system performance, invest...
The Information Security Analyst is responsible for establishing and executing a portion of the Globe Life Information Security Program to provide information security services that support the reduction of business security risk. Routinely review documentation related to regulations, standards, and...
The Business Risk and Control Office (BRCO) Control Testing Analyst is responsible for the structured, post-execution review to validate that processes and controls function as intended to mitigate risk, including SOX controls. The BRCO Control Testing Analyst must not be involved in the design and ...
The Intelligence Analyst (IA) within Enterprise Safety & Security will specialize in the collection, analysis, evaluation, and interpretation of security risk intelligence information. Center 1 (19052), United States of America, McLean, VirginiaPrincipal Associate, Security Intelligence Analyst. Are...
The Security Analyst team is responsible for testing, designing and implementing security controls and solutions driven by CISO policies and standards to reduce the risk to NTT data and its customers. We are currently seeking a Cyber Security Operation Analyst to join our team in Not specified, Texa...
As a member of the Global Cyber Security Correlations Team, the Analyst 2, Security is an experienced professional responsible for analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for analyzing system ...
The Information Security Analyst is responsible for establishing and executing a portion of the Globe Life Information Security Program to provide information security services that support the reduction of business security risk. Routinely review documentation related to regulations, standards, and...
Job description Infosys is seeking a UVM Application Security Analyst. ...
As a member of the Global Cyber Security Monitoring Team, the Analyst 3, Security is a highly experienced professional responsible for correlation, analysis, response, and triage of security alerts/events, determining which steps to take to mitigate the threat. Security analysts are responsible for ...
As a Staff Security GRC Analyst, you will be responsible for identifying, assessing, and prioritizing security risks across large areas of the business including Engineering and Security organizations. Own end to end security risk management methodology to enhance the organization's security posture...
The Information Security Analyst participates in the development, communication, implementation, enforcement and monitoring of security controls to protect the organization's technology assets from intentional or inadvertent modification, disclosure or destruction. Job Title: Cyber Security Analyst ...
As a Cyber Security Analyst at Upbound, your primary responsibility is to deliver advanced technical analysis, guidance, and mitigation strategies for logical security threats impacting our infrastructure and data security. Relevant technical security certifications (example: Security+, CEH, AWS Sec...
Symbol" data-leveltext=" " data-list-defn-props="{"335552541":1,"335559683":0,"335559684":-2,"335559685":720,"335559991":360,"469769226":"Symbol","469769242":[8226],"469777803":"left&...
Collaborate with Information / Cyber Security, Corporate Security, Program Management, Data Science and Engineering to investigate and resolve fraud, security, and identity escalations and identify/implement technology solutions to minimize such incidents. Risk data/system analyst experience; Comput...