THE LARGEST COLLECTION OF JOBS ON EARTH
information technology
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
Description This position is within the EIP Cyber Threat Intelligence (CTI) Operational Team. The Senior Cyber Intelligence Analyst analyst will focus on understanding and conducting in depth analysis on the threat ..
... support the Information System Security Manager (ISSM) with implementing and maintaining ... with implementing and maintaining a cybersecurity program for an ongoing contract ... requirements in support of the..
18,166 Job Information Deloitte Cybersecurity Zero Trust Architect (Remote) in ... position then Deloitte’s Federal Cyber Risk team could be the place ... Join our team of Cyber Risk professionals..
ENSCO is seeking an innovative, creative, and highly motivated individual to support the U.S. Space Force, Space and Missile Center’s MILSATCOM Program through the MILSATCOM Systems Engineering, Integration and Test (MSEIT) ..
Description This position is within the EIP Cyber Threat Intelligence (CTI) Operational Team. Senior Cyber Intelligence Analyst focus on understanding and conducting in depth analysis on adversarial capabilities, infrastructure, and TTPs; ..
... Product Support tasks directed by supervisor/manager, as neededu003c/liu003eu003cliu003eAssist Product Support Managementu003c/liu003eu003cliu003eAssist ... Information Technology Continuous Support and Cybersecurity Managementu003c/liu003eu003cliu003eAssist in Support Equipment Managementu003c/liu003eu003cliu003eAssist ... u0026amp; support; communications development; financial..
... Job Description The IT Project Manager 2 will lead the IT ... IT M&A Security Remediation project management team. This role will actively ... Working knowledge with Information Security..
... information and communication technologies, including cybersecurity **Nice to Have** Medical device ... system requirements methodologies. Familiar with risk management techniques (i.e. Failure Modes and ... system requirements methodologies. Familiar..
... integration hypothesis. Develop a standard risk-based approach/methodology for the technology environment ... the IT infrastructure and IT security/cybersecurity assessment process. Develop an initial ... issues identified during the vendor..
... Y Relocation? N Position Type Management JOB SUMMARY Leads and drives ... SUMMARY Leads and drives security risk management as part of the Security ... as part of the..
... Information Humana Senior Cyber Data Manager (remote virtual home office) in ... the [Author by Humana] technology Cybersecurity leadership team reporting to the ... also contribute to a lean..
... Vice President (AVP), Technology and Cybersecurity Risk works closely with all areas ... Protection (EIP), Internal Audit, Enterprise Risk Management, business units, regulatory agencies, and ... ensure the company's..
... Information Humana Director, IT Program Risk Management in Colorado Springs Colorado Description ... Colorado Description The Director, Program Risk Management is responsible for identifying and ... developing and managing..
... corporate development team and integration management office (IMO) on all growth ... concerning IT infrastructure and IT security/cybersecurity by analyzing and assessing target ... integration hypothesis. Develop a standard..
... security posture and minimize our risk. The Director, Cyber Defense and ... cyber-threats and understands end-to-end data management processes and flows and uses ... threat and data protection and..