A company is looking for a Senior Information Security Analyst to join their team. ...
This role requires an individual adept in all areas of cyber security, with particular skills in identifying, analyzing, and neutralizing advanced cyber threats, requiring proven experience with Azure and AWS cloud security. Conduct security awareness training with a focus on threat detection and re...
A company is looking for a Lead Blockchain Security Analyst to design and execute a blockchain security assessment program. ...
Security Operations Center) will be assigned to furthering the security mission within the client's Regional Security Operations Center (RSOC) and Global Security Operations Center (GSOC). The SOC Security Analyst is responsible for delivering operations within the GPS control room across all client...
A company is looking for a SOC Security Analyst to help manage IT security for global customers. ...
Understand the relationship between information security policies, standards, procedures, and controls as they pertain to the delivery and maintenance of quality systems so that you can effectively advocate information security rationale to business stakeholders. You will report to the Director of I...
Basic proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls assessment, and security control gap analysis. Proficiency with cyber security controls, security compliance analysis, security risk assessment, cyber security controls ass...
Security Operations Center) will be assigned to furthering the security mission within the client's Regional Security Operations Center (RSOC) and Global Security Operations Center (GSOC). The SOC Security Analyst is responsible for delivering operations within the GPS control room across all client...
About the role: The Security Operations Analyst (SOA) assists with day-to-day cyber security administration and operations. The SOA is our first contact for any security events, researches and reports on emerging threats, and is responsible for security administration. Analyzing security logs, alert...
In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
RAND AI &Information Security Analysts advance RAND’s research in the intersection of AI, information security, and biosecurity by performing qualitative and quantitative research driving recommendations for the White House, multiple regulatory agencies, intelligence community, and other arms of the...
About this position: Job Title: Analyst Client Title: Loss Prevention (LP) Analyst Division: Retail Location (City/State): Cupertino, CA Employment Type: Full Time FLSA Status: Non-Exempt About us: Security Industry Specialists, Inc. SIS) provides security solutions to some of the most recognized co...
In This Role, You Will: Support day-to-day execution of security processes in areas related to perimeter and endpoint security, cloud security posture management, vulnerability management, security observability, and security operations Leverage skills and experience working with Infrastructure as c...
The Security Operations Analyst (SOA) assists with day-to-day cyber security administration and operations. The SOA is our first contact for any security events, researches and reports on emerging threats, and is responsible for security administration. Analyzing security logs, alerts, and other dat...
They are rapidly becoming a well-known and well-respected entity within their specialism of cyber security consulting with an ever-increasing client base. This job is ideally suited to those who have already had some kind of work or work placement experience within the Cyber Security arena. The long...
This AI Security and Risk Analyst position will support the analysis of AI products, working closely with the project team to analyze use cases for AI implementation. Acting as a liaison, this analyst will ensure adherence to security requirements, contributing to the safe and effective deployment o...
Assists the Facility Security Officer with all required security controls for classified information systems and performs the day-to day security operation of those systems. Develops and maintains operational security posture to ensure classified information systems (IS) security policies, standards...
As the Cloud Security Analyst, you will utilize your wide area of expertise in access control management, cybersecurity, vulnerability management, risk management, incident management, security frameworks and other areas to provide security support for the Harris group of companies. Work with Inform...
In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
Investigate security alerts to determine if the alert is a false positive, a security Event, and/or a security Incident. At least 5 years' experience in intrusion analysis or cyber security investigations in a Security Operations Center (SOC) or Computer Emergency Response Team (CERT) environment. I...
In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
The role of the Sr Analyst - Data Security is to provide the analytical and technical support to advance the objectives of the Maximus Information Security Office – Data Governance and Security program, promote data policies and standards, and enhance the engagement of enterprise Data Owners and Dat...
Bachelor's degree in business, Computer Science, Information Systems, or equivalent experience in lieu of degree required.Strong knowledge of IT Service Management processes; experience with administration or support of IT Service Management tool required.Cherwell experience preferred or any other I...
Experience must include at least 4 of the following: WAN firewalls Design, configuration, and ongoing support of network security systems Encryption methods and privacy technologies Developing secure collaboration solutions with external partners or affiliates Computer security technologies, such as...