Aeyon Consulting is currently seeking qualified candidates to work in Indianapolis, IN or remote location as a Financial Management Analyst. USMC Accounting Analyst - Fiscal Voucher and or Compliance teams. ...
Information Security GRC Analysts gain exposure to a broad range of information security and operational functions of the overall organization. You'll be heavily involved with enterprise training and awareness activities, including the development of annual security trainings, phishing simulations, ...
Financial Intelligence Unit Analyst - BSA/AML Fraud & Security Admin. The FIU Analyst assists and supports the Financial Intelligence Unit (FIU) within the Fraud, Bank Secrecy Act and Security Admin Department by investigating and protecting the Bank from known or suspected internal and external cri...
A company is looking for an Information Security Analyst. ...
Security & Controls processes through technical expertise and innovative solutions. The BPKC is responsible for providing business process and SAP training, consulting, high-level problem resolution, process improvements, innovation, project implementations, and tool and process governance in an...
A company is looking for a Senior Public Sector Security Analyst. ...
Financial Intelligence Unit Analyst - BSA/AML Fraud & Security Admin. The FIU Analyst assists and supports the Financial Intelligence Unit (FIU) within the Fraud, Bank Secrecy Act and Security Admin Department by investigating and protecting the Bank from known or suspected internal and external cri...
Key Responsibilities:Respond to security events and conduct initial triage and investigationDetect, escalate, and manage critical security incidentsContribute to threat hunting, content development, and security automationRequired Qualifications:Bachelor's degree or equivalent industry experience7+ ...
The Information Security Analyst II works within the Information Security Governance team and closely with Bank management and members of the Information Security Department to execute a Bank-wide information security management program. Achieved or are in pursuit of Information Security Certificati...
Knowledge of third-party library security analysis and the ability to identify potential security leaks. Assess security risks associated with code vulnerabilities and develop a prioritization strategy that mitigates the most critical issues efficiently. Draft policies, procedures, and best practice...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
Assess security risks associated with code vulnerabilities and develop a prioritization strategy that mitigates the most critical issues efficiently. Draft policies, procedures, and best practices for publication in Atlassian Confluence to ensure consistent security practices across the organization...
The Information Security Analyst II works within the Information Security Governance team and closely with Bank management and members of the Information Security Department to execute a Bank-wide information security management program. Achieved or are in pursuit of Information Security Certificati...
Brooksource is seeking an Application Security Analyst that will function as primary security code auditor for our government client’s primary application. Knowledge of third-party library security analysis and the ability to identify potential security leaks. Assess security risks associated with c...
Brooksource is seeking an Application Security Analyst that will function as primary security code auditor for our government client’s primary application. Knowledge of third-party library security analysis and the ability to identify potential security leaks. Information Security Analyst Indianapol...
Information security analyst position that functions as primary security code auditor for the agency's primary application. Job Title: Information Security Analyst - Code and Vulnerability Analysis. Knowledge of third-party library security analysis and the ability to identify potential security lea...
Senior Security Analyst REMOTE Schedule: 8:00AM – 5:00PM Eastern Time 5x8 Shift (Monday-Friday) MUST have a minimum of 1 year of experience with one or more of the following: Microsoft Defender CrowdStrike SentinelOne MUST have a minimum of 4 years of experience in a SOC Analyst ...
Participates and completes tasks associated with the implementations for systems and network security technologies; executes testing plans. Coordinates and prepares reporting of data security events and incidents. Designs and analyzes vendor services and information security requirements; maintains ...
Information security analyst position thatfunctions as primary security code auditor for the agencys primaryapplication. Information Security AnalystCode and Vulnerability Analysis. Knowledge of thirdpartylibrary security analysis and the ability to identify potentialsecurity leaks. Assesssecurity r...
Position: IN DWD - Information Security Analyst - Code and Vulnerability Analysis. Knowledge of third-party library security analysis and the ability to identify potential security leaks. Assess security risks associated with code vulnerabilities and develop a prioritization strategy that mitigates ...
Security & Controls processes through technical expertise and innovative solutions. The BPKC is responsible for providing business process and SAP training, consulting, high-level problem resolution, process improvements, innovation, project implementations, and tool and process governance in an eff...
The FIU Analyst assists and supports the Financial Intelligence Unit (FIU) within the Fraud, Bank Secrecy Act and Security Admin Department by investigating and protecting the Bank from known or suspected internal and external criminal activities, including fraud, money laundering and BSA issues. ...
Knowledge of third-party library security analysis and the ability to identify potential security leaks. Assess security risks associated with code vulnerabilities and develop a prioritization strategy that mitigates the most critical issues efficiently. Draft policies, procedures, and best practice...