Get new jobs by email
- ...will play a key role in the implementation and adoption of the data governance framework which will modernize Amgens data ecosystem,... ...management, data quality, master data management, data stewardship, data protection, etc. In depth experience with data products development life...Suggested
- Job Description We are seeking an experienced Network and Security Administrator to join our IT Support team at Maheshwaram. This role has been created to address the increased number of systems and firewalls at our location, ensuring effective monitoring and management of...Suggested
- ...Job Objective: The Information Protection Senior Advisor is responsible for conducting research, conceptualizing, designing, developing,... ...addressed safeguarding the protection of sensitive policyholder data, claims information, and financial transactions. Reporting to...SuggestedHybrid work
- ...including capability development (People, Processes, Technology, Data). Ability to perform Controls Assurance / Attestation and... ...network security, cloud security, application security and endpoint protection. Deep knowledge of security risks, data privacy laws, and...SuggestedHybrid work
- Requirements Elicitation, Understanding, Analysis, & Management Understand the project'Vision and requirements, and contribute to the creation of the supplemental requirements, building the low-level technical specifications for a particular platform and/or service solution...Suggested
- Required Skills & Qualifications: ~ Bachelor's degree in Computer Science, IT, Cybersecurity, or related field ~2+ years of experience in cybersecurity or information security ~ Proficiency in tools like SIEM (Splunk, QRadar, etc ), IDS/IPS, and antivirus systems ~ ...Suggested
- Key Responsibilities: Monitor network traffic for suspicious activity. Investigate and respond to security incidents. Conduct vulnerability assessments and penetration tests. Install and manage firewalls, antivirus, and encryption tools. Develop and enforce security...Suggested
- ...Experience with security tools and platforms such as static analysis (SAST), dynamic analysis (DAST), and runtime application self-protection (RASP). Knowledge of regulatory and compliance frameworks (e.g., GDPR, HIPAA, PCI-DSS). Hands-on experience with security automation...Suggested
- ...security infrastructure; (iv) integrating threat intelligence into the operational environment; and (v) protecting systems and infrastructure from infiltration or exfiltration of data. Responsibilities: Perform analyses of network infrastructure, applications,...Suggested
- ...Responsibilities: Monitor security alerts and analyze potential threats using security tools such as SIEM , IDS/IPS , and endpoint protection platforms. Conduct vulnerability assessments and work with IT teams to remediate identified risks. Investigate security...Suggested
- ...in systems and networks. # Implement and enforce security measures, such as firewalls, encryption, and access controls, to protect sensitive data and systems. # Investigate and resolve security incidents, working with the incident response team to contain and mitigate breaches...SuggestedWorldwide
- ...departments. Key Responsibilities: Microsoft Defender Expertise Experience with Microsoft Defender for Office 365 (email threat protection, anti-phishing, anti-malware, safe links/attachments). Ability to manage and optimize Defender Security Policies....SuggestedFull timeContract workWork at officeRemote jobShift workSaturday
- We are seeking a Senior Cyber Security Consultant with extensive experience in enterprise IT security, risk management, and cloud-based security solutions. The ideal candidate will have a deep understanding of managing cyber security risks during digital transformations and...Suggested
- ...security incidents and alerts. Conduct vulnerability assessments and penetration testing. Implement security measures to protect sensitive data and systems. Prepare and present security reports to management. Collaborate with IT teams to enhance security practices...Suggested
- ...Key Responsibilities: Design Data Discovery Processes: Develop comprehensive Data Discovery processes to identify, classify, and protect sensitive data across the organization. Create Standard Operating Procedures (SOPs): Draft and implement templatized SOPs for data...Suggested
- Roles and Responsibility As a Cybersecurity Analyst for Victory Live, you will play a critical role in safeguarding the organization's cloud and on-premises infrastructure. You will be responsible for monitoring, detecting, analyzing, and responding to cybersecurity threats...
- ..., configuration changes, and risk mitigation strategies. Experience working with security tools for Data Loss Prevention (DLP), Threat Intelligence, Endpoint Protection, and Security Information & Event Management (SIEM), Zscaler. Ability to support and build new security...For contractors
- Job description Primary Responsibilities: Come to terms with all relevant Cybersecurity methodology, terminology and Technology Governance processes. Design Cybersecurity controls to adapt to new emerging threats and challenges. Establish relationships with internal...
- ...in risk management, compliance, and security strategy, while also playing a key role in driving initiatives to ensure the protection of sensitive data, particularly in a highly regulated healthcare environment. You will collaborate with cross-functional teams to evaluate and...Long term contractFlexible hours
- Overview This Role is for SAP Security Analyst, the primary focus is to support and drive SAP Security deliverables. They also ensure that application security standards are well maintained and supported in collaboration with the SAP Security team leads. The SAP security...Local area
- ...to identify and reduce the risks posed by third parties. This is an extremely important role, considering the fact that large number of data breaches happen due to third parties. It involves working with internal stake holders as well as third parties to achieve the result...US shift
- ...tracking, and mitigation of risks associated with security tools exclusion management. Identify exclusions that require follow up through data quality efforts. ~ Data Quality: Ensure accuracy and integrity of program data, identifying gaps and implementing corrective actions...
- ...HOW YOU WILL FULFILL YOUR POTENTIAL The Digital Risk Office (DRO) is accountable for managing and executing the process of continuous line 1 Firmwide Engineering thematic risk discovery, prioritization, remediation and governance The role will be to assess risk for various...Work at office
- ...your development. Whether you're working in our four global Home Offices, Distribution Centers or Retail Stores—TJ Maxx, Marshalls,... ...status, or based on any individual's status in any group or class protected by applicable federal, state, or local law. TJX also provides reasonable...Long term contractLocal areaHome officeShift work
- At PwC, our people in cybersecurity focus on protecting organisations from cyber threats through advanced technologies and strategies. They... ...systems, and provide proactive solutions to safeguard sensitive data. In cybersecurity incident management at PwC, you will focus on...
- What You Will Do In This Role Lead and grow a team of engineers, ranging from recent graduates to seasoned professionals. Provide mentorship, coaching, and structured career development feedback. Define and monitor team health indicators and productivity metrics...Remote job
- What you will do in this role Lead and develop a team of engineers, ranging from graduate to senior Provide technical guidance on vulnerability remediation Drive the development of new security engineering projects Work with upstream open source projects on vulnerability...Local areaWorldwide
- ...with security information and event management (SIEM) tools. ~ Knowledge of network security, identity and access management, and data protection. ~ Having certifications like CISSP, CISM, AWS Certified Security - Specialty is preferred ~ Strong analytical and problem-...Immediate start
- Key Responsibilities: Design and manage Zscaler ZIA/ZPA for secure cloud access and zero-trust networking. Administer CyberArk PAM solutions, including vault management and session monitoring. Configure and optimize Web Application Firewalls (WAF)to mitigate OWASP...
- Role & responsibilities ~ Experience: At least 6 years in static code analysis/SAST (Static Application Security Testing), secure coding, and software development. Technical Skills: Proficiency in static code analysis tools (e.g., SonarQube, Veracode, Checkmarx) and...