In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
A company is looking for a Staff Information Security Analyst to manage and execute internal technology projects and security operations. ...
In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
A company is looking for a Senior Security Governance, Risk, and Compliance (GRC) Analyst. ...
In-depth knowledge of network and system security, security protocols, cryptography, and risk management. Relevant cybersecurity certifications, such as: CISS, CISM, CEH, Comp TIA Security+, GSEC, CISA, etc. Conduct regular risk assessments and audits to evaluate the security posture. Test and Valid...
A company is looking for an Epic Security Analyst IV to manage security protocols and processes in support of their Acumen line of business. ...
Security Analyst - Azure Sentinel. The Security Analyst – Azure Sentinel’s primary role surrounds the configuration, management and maintenance of EMCOR’s Azure Sentinel Service and related data sets. Work with the overall security department to continually improve the security program. This include...
The Information Technology Security Compliance Analyst is a technical and analytical position within Meritage Homes’ IT Security Team focused primarily on issues in Governance Risk & Compliance (GRC) which include risk management, vendor management, compliance management, security awareness, risk & ...
Responsible for assisting with activities designed to systematically handle information security, such as security investigations, intelligence, assurance, and awareness, and/or other project oversight, including developing standard methodologies for information security standards and handling IT co...
Act as cybersecurity partner to Line of Business and Sourcing when negotiating cybersecurity contractual term with Third Parties, to promote security best practices. Consult with line of business on the consistent implementation of the enterprise information security model and solutions to remediate...
Security Risk and Compliance Analyst II-Cyber. Seeking a detail-oriented information Security professional with experience assessing Third-party Security Risk. The ideal candidate has a strong understanding of information security frameworks, common information technology principles, experience eval...
Mentor and guide junior security analysts within the security operations team, fostering a culture of continuous learning and professional development. Continuously monitor and evaluate the organization's cybersecurity posture, using security tools and techniques to detect potential threats and vuln...
Minimum of 3 years of experience in one or more or more of the following areas is required: Information Security, Enterprise Security Monitoring & response, Security Orchestration and Automation, Information Technology, penetration testing, threat intelligence, security architecture/design strategy,...
Security Analyst - Attack Simulation. The Security Analyst – Attack Simulation’s primary role surrounds the configuration, management and maintenance of EMCOR’s Attack Simulation Services. Work with the overall security department to continually improve the security program. This includes electrical...
Install, configure and maintain appliances to support current cybersecurity configuration standards, performance notification, traffic monitoring and traffic sniffing; analyze, design and implement computer control logic and strategies; analyze and repair technology security systems software and tec...
The Security Analyst for Identity and Access Management (IAM) is responsible for supporting the maintenance of EMCOR’s Security Program with a focus on the company’s identity systems and single sign-on systems (SSO). Security Analyst – Identity and Access Management. This includes electrical, mechan...
Identify advanced security vulnerabilities and attacks techniques. ...
In this role the risk analyst will support cyber security program functions; use program frameworks and guidance to independently evaluate the design and effectiveness of cybersecurity controls within the bank's applications, systems, databases, and platforms; plan and perform cybersecurity assessme...
You will also lead security risk assessments of blockchains, and provide security expertise and risk mitigation recommendations to various enterprise teams. In this role, you will design and execute a robust blockchain security assessment program. Leverage your technical understanding of various blo...
The Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & Business Data Architecture into core data life cycle activities, expand Data Governance Operating Mod...
The Arizona Department of Corrections, Rehabilitation and Reentry (ADCRR) is looking to fill the Security and Programs Analyst position. ADOA Personnel Rules and ADCRR policies and procedures and best practices in correctional security and programming. Protective custody protocols and modern correct...
IntraEdge has a long-term opportunity for an IT Security Analyst - Senior Level. Security Operations – EDR, Antivirus, handling Phishing incidents, patching systems. ...
The Data Risk Management Team within the Technology Risk & Information Security (TRIS) organization is critical to the elevation of technology and data risk by embedding and centralizing Technical & Business Data Architecture into core data life cycle activities, expand Data Governance Operating Mod...
Wells Fargo is seeking an IAM Initiatives Analyst that will be part of the Identity and Access Management Initiatives team that provides effective end to end IAM initiative and issue management including strategic solutioning, execution management, testing and validation readiness, impediment remedi...
Act as cybersecurity partner to Line of Business and Sourcing when negotiating cybersecurity contractual term with Third Parties, to promote security best practices. Provide advanced information security consultation for all aspects of information security compliance policy, risk management, and rem...