- Merck & Co. (Rahway, NJ)
- …The Technical Product Manager is a key member of the Legal, Compliance and Security Value team. - The Technical Product Manager plays a critical role in ... - - A key aspect of the Technical Product Manager 's role is to apply standard techniques and tools...requirement to be vaccinated against COVID-19 in order to access a facility or meet with stakeholders). -Please understand… more
- EY (Philadelphia, PA)
- …yourself, and a better working world for all.Technology - Cyber Security - Identity & Access Management (IAM) ( Manager ) (Multiple Positions), Ernst & ... Help clients gain insight and context to their complex Identity and Access Management (IAM) environments. Assess,...meet the client's IAM needs. Assist clients in aligning security management strategy with business goals by managing who… more
- Daiichi Sankyo, Inc. (Basking Ridge, NJ)
- …Quality, Master Data Management, Reference Data Management, Data Retention & Archival, Data Access Control & Data Security software.- Must have familiarity with ... areas centered around rare diseases and immune disorders.SummaryThis Data Governance Communications Manager will be a critical part of the Center for Data Governance… more
- Daiichi Sankyo, Inc. (Basking Ridge, NJ)
- …artifacts o Security and protection of organizational data assets o Access Control leveraging administrative controls of data access rights for ... as other research areas centered around rare diseases and immune disorders.Summary The Manager of Data Governance Stewardship will work in areas required for the… more
- Eisai, Inc (Nutley, NJ)
- …difference. If this is your profile, we want to hear from you.Senior Manager , US Alzheimer's Strategy and Lifecycle Planning Marketing will assist with the ... Co-lead cross-functional project teams involving Marketing, Sales, Managed Markets/Market Access , Legal, Regulatory, Medical, PR, agencies, actively soliciting team… more
- Merck & Co. (Rahway, NJ)
- …with the management and governance of master data, and supporting system security and administration for various applications that support these processes. The ... loading, along with the validation process. Provide guidance to Finance on security role management across various SAP and non-SAP systems.Configure and schedule… more
- EY (Philadelphia, PA)
- …exceptional experience for yourself, and a better working world for all.Cyber Security - Cyber Transformation ( Manager ) (Multiple Positions)(1502859), Ernst & ... programs, identifying and responding to cyber threats, managing identity and access effectively and efficiently, and/or...with clients to discuss issues such as computer data access needs, security violations, and programming changes.… more
- EY (Atlanta, GA)
- …of risk management and can focus on improving business performance in SAP Application Security and GRC. As a Risk Technology Manager , you can expect to ... implement their processes into the SAP ERP through transformation journeys with Application security , GRC Access Control or similar such SaaS offerings. To make… more
- EY (Boston, MA)
- …Amazon ECS, Fargate, GKE, or similar- DevSecOps and CI/CD pipeline- Cloud Access Security Broker and Data Loss Prevention, including Netskope, Zscaler, ... better working world for all.Cyber Security , Cloud Security & Security Architecture ( Manager )...including Splunk, Azure Sentinel, or similar- Threat detection and Identity and Access Management. Must have 2… more
- EY (Dallas, TX)
- …Amazon ECS, Fargate, GKE, or similar - DevSecOps and CI/CD pipeline - Cloud Access Security Broker and Data Loss Prevention, including Netskope, Zscaler, Google ... for yourself, and a better working world for all.Cyber Security , Cloud Security & Security Architecture ( Manager ) (Multiple Positions), Ernst & Young… more
- EY (Hoboken, NJ)
- … objectives. Provide professional knowledge and experience of information systems security identity policies and large enterprise scale practices. Develop ... IAM Architecture in a hands-on role focused on the security architecture in the identity lifecycle management..., namely:SME knowledge of Sailpoint IdentityIQ (IIQ), Sailpoint File Access Manager (FAM) and Active Directory.Strong knowledge… more
- EY (Detroit, MI)
- …data classification, digital rights management, cloud data loss prevention / cloud access security brokers, tokenization, file and database encryption. Manage ... an exceptional experience for yourself, and a better working world for all.Cyber Security - Data Protection ( Manager ) (Multiple Positions), Ernst & Young US… more
- Merck & Co. (Rahway, NJ)
- …Additional responsibilities include support of printer configuration, management and security configuration.The incumbent will also be responsible for interfacing ... systems. The engineer will also look to strengthen the governance, configuration, security , purchasing standards and guidelines for our business partners, such as to… more
- Novo Nordisk Inc. (West Lebanon, IN)
- …plus individual company match option 12 weeks Paid Parental Leave Free access to Novo Nordisk-marketed pharmaceutical products The Position This position performs ... design, installation, configuration, administration, and maintenance of network, security systems, servers, desktops, VoIP phones, AV systems and server rooms,… more
- Merck & Co. (Rahway, NJ)
- …of the SAP landscape. You will ensure the availability, performance, and security of SAP systems, databases, and related technologies. This role requires expertise ... team members.Collaboration:Collaborate with other IT teams, such as infrastructure, security , and application development teams.Work closely with SAP functional… more
- Merck & Co. (Rahway, NJ)
- …implement, and automate integrations with other tools, technologies, security controls, governance processes, and compliance validation.Develop a library ... (for example, a requirement to be vaccinated against COVID-19 in order to access a facility or meet with stakeholders). -Please understand that, as permitted by… more
- EY (Mclean, VA)
- …CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager ), CCSP (Certified Cloud Security Professional) ... a security engineering role, with a focus on data security , privacy, and access management.DoD or government experience preferredProfessional certifications,… more
- EY (Dallas, TX)
- …solutions for their increasingly complex risks and vulnerabilities. As a part of our Identity and Access Management (IAM) team you'll be right at the heart ... world for all.Cyber Managed Services -SDC- IAM - Senior Manager DescriptionIn a rapidly changing IT environment, clients from...and governance IAM policies, procedures and standards On our Identity & access transformation team, you'll provide… more
- EY (Houston, TX)
- …a better working world for all.Risk Advisor, Technology Consulting - Cyber Security (Cyber Threat Management - Vulnerability ID) ( Manager ) (Multiple Positions), ... programs, identifying and responding to cyber threats, managing identity and access effectively and efficiently, and/or...with clients to discuss issues such as computer data access needs, security violations, and programming changes.… more
- EY (Dallas, TX)
- …practice continues to expand, we are seeking a highly motivated Senior Manager , focused on Oracle application security and controls transformations, to ... business performance variability, business and process controls transformation, application security , risk management technology enablement, continuous controls monitoring, and… more