THE LARGEST COLLECTION OF JOBS ON EARTH
information technology
Supports PDF, DOC, DOCX, TXT, XLS, WPD, HTM, HTML files up to 5 MB
... is within the EIP Cyber Threat Intelligence (CTI) Operational Team. The ... in depth analysis on the threat methodologies, adversarial capabilities, infrastructure, and ... of artifacts and methodologies of..
Description The Senior IT Project Manager oversees various system projects and/or ... highly complex nature. The Senior IT Project Manager work assignments involve moderately complex ... variable factors. Responsibilities The..
... who collaborate with government agencies, IT professionals, and clients to support ... environments more secure. The Vulnerability Management Engineer is accountable for securing ... effectively evaluate threats. • Communicate..
... Auditor, Policy Analyst, and Project Management Business Analyst (PMBA). The Auditor ... and prepare governance and compliance management reports. The PMBA CO II ... metrics, or training such that..
... to Governance, Cyber Services Unit Manager and shall prepare and present ... and present governance and compliance management reports, key performance metrics, scorecards, ... to the CISO and executive..
... a thorough understanding of persistent threat tactics and techniques and the ... a thorough understanding of persistent threat tactics and techniques and the ... existing and new information technology..
... cybersecurity, including security architecture, risk management, security governance, controls, compliance, infrastructure, ... engagement proposals.Assess and investigate client IT security programs and environments via ... a security perspective.Provide recommendations on..
... looking for: As a Senior Manager, Security Incident Commander, you will ... Product Security Incident Response and Threat & Vulnerability Management teams Serve as Incident Commander, ... attacks, organized..
Description Our security threat landscape is constantly evolving and ... team is seeking a Program Manager who is passionate about leading ... Humana is seeking a Senior IT Security Program..
... nation's capital. The Cybersecurity Vulnerability Management (CVM) Engineer III role reports ... tools, as well as strong management and communication skills. Minimum Qualifications ... Software Engineering, Electrical Engineering, Engineering..
... Y Relocation? N Position Type Management JOB SUMMARY Leads and drives ... Leads and drives security risk management as part of the Security ... Information Risk methodology Analyze the..
... requirements and issues with senior management from both the business and ... next generation architecture. Collaborate with IT and Developers to design and ... Qualifications Bachelor's degree in an..
... to senior leaders the why it's important and how it works. You have a strong ... and research issues from our Threat Modeling program, tying potential threats ... Knowledge..
... is within the EIP Cyber Threat Intelligence (CTI) Operational Team. Senior ... be part of the Cyber Threat Intelligence Operational Team. Senior Cyber ... actionable products based on analyzed..
Description Our security threat landscape is constantly evolving and ... is seeking a Lead Program Manager who is passionate about leading ... and outcomes Actively manage business, IT, and security..
Description The Associate Director, Infrastructure/Network Security leads and participates in the development of enterprise-level network and infrastructure security strategies. A solid understanding of how organization capabilities interrelate across department(s) will be ..
Job Information Humana Senior IT Project Manager (Open to Remote Work Style) ... Of Columbia Description The Senior IT Project Manager oversees various system projects and/or ... highly complex nature...
... functions for engineering: Architecture, Identity Management, Backend Services, and Integration framework ... Global omni. Example is Identity management. Essential Duties & Responsibilities Spearhead ... growth. Build and maintain identity..
... us gain insight and prevent threat and data leakage in changing ... and data leakage in changing threat landscape via use of technologies ... cyber-threats and understands end-to-end data..
... based on the NIST risk management framework for information systems (RMF) ... all supply chain and risk management activities. The ASO CO I ... and an understanding of the..
Job Information Humana Senior Cloud Security Engineer (virtual remote) in Washington District Of Columbia Description Responsibilities Our Department of Defense Contract requires U.S. citizenship for this position The Remote Senior Cloud ..