- US Bank (Cincinnati, OH)
- …benefit equation of control changes + Provide recommendations on internal control assessments with business and technology partners + Possess understanding ... gaps in controls + Professional writing skills with experience in documenting controls , control testing procedures and control testing results + Skilled… more
- MUFG (Tampa, FL)
- …and monitor effective, evidencable controls . + Strong knowledge of the inherent risk in the business. + Experience in control testing and issue validation. ... provide more details. **Job Summary** As the Head of Risk & Controls for GCIB (Global Corporate...role will focus on maintaining and enhancing a comprehensive risk and control program governance and reporting… more
- State of Michigan (Lansing, MI)
- Info Tech Programmer/Analyst 9-12-REPOSTING Print (https://www.governmentjobs.com/careers/michigan/jobs/newprint/4377293) Apply Info Tech Programmer/Analyst ... Lansing, MI Job Type Permanent Full Time Job Number 0801-24-23-12MB Department Technology , Management and Budget Opening Date 04/22/2024 Closing Date 5/6/2024 11:59… more
- United States Fleet Forces Command (Naval Base, VA)
- Summary You will serve as a Information Technology Specialist (PLCYPLN/INFOSEC) in the Office of the Deputy Director for Cyber Security of TASK FORCE 82. ... ensure protection of critical information systems including Navy Nuclear Command, Control , and Communication (NC3) systems. You will ensure information systems… more
- Bank of America (Denver, CO)
- Third Party Info Security Consultant Denver, Colorado;Chicago, Illinois **Job Description:** At Bank of America, we are guided by a common purpose to help make ... reviewing documentation during the assessment, determining if appropriate information security controls are in place, and completing an assessments of workpapers.… more
- L3Harris (Clifton, NJ)
- Job Title: Lead, Info Security Sys Engineering Job Code: 8297 Job Location: Clifton, New NJ Job Description: L3Harris Technologies is seeking a dynamic Information ... requirements analysis, secure architecture development, management & compliance with security controls , design review milestones (SRR, SDR, PDR, CDR) and security… more
- USAA (San Antonio, TX)
- …be a part of what makes us so special! **The Opportunity** As a dedicated Info Security Analyst Senior - Red Team, you will investigate, analyze, and respond to ... improvements to the existing detection capabilities, operational processes and security controls . + Prepares and delivers written and/or verbal briefs with… more
- ManpowerGroup (Cleveland, OH)
- …We are seeking a security analyst with a strong background in security and technology , coupled with expertise in risk management. The ideal candidate will be ... responsible for participating in technology access control reviews, line of business...security risks. The candidate must possess experience with access controls for various resources such as Windows, Linux, databases… more
- Burns & McDonnell (Kansas City, MO)
- …testing as applicable. + Implement and support assigned security technology and controls to reduce cybersecurity risk for the company. + Complete routine ... risk management, incident response, vulnerability management; and security technology implementation and operations. This position will be an in-office working… more
- Huntington Ingalls Industries (Annapolis Junction, MD)
- …of Experience: Mid HI This opportunity resides with Command, Control , Communications, Computers, Cyber, Intelligence, Surveillance and Reconnaissance (C5ISR), a ... System Security Officer (ISSO) tasks related to the implementation of security controls , perform and document continuous monitoring of security controls , review… more
- Huntington Ingalls Industries (Fort Meade, MD)
- …Expert Understanding and practical experience with Authority to Operate (ATO) process, Risk Management Framework (RMF) ISSM/ISSO / Security Control Assessment ... security. You will help to ensure the implementation and maintenance of security controls in accordance with the Continuous Monitoring Security Plan (CMP). Also, you… more
- Duquesne Light Company (Pittsburgh, PA)
- …want you to join our team! **Business Unit:** Information Technology (IT) **Division:** Information Security (ITSec) **Department:** Information Security (InfoSec) ... Center:** CIP Cyber Security Operations (550) **Job Family:** Information Technology **Discipline:** Information Security - Operations and Engineering **Career… more
- L3Harris (Palm Bay, FL)
- …systems, networks, and database products. Uses methods such as encryption technology , vulnerability analysis and security management. Responsible for integration of ... analysis, secure architecture development, management & compliance with security controls , system lifecycle management and reviews and security test/verification… more
- L3Harris (Colorado Springs, CO)
- …and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body ... systems, networks, and database products. Uses methods such as encryption technology , vulnerability analysis and security management. Responsible for integration of… more
- University of Rochester (Rochester, NY)
- …security leadership, teammates and stakeholders to evaluate and implement data protection controls that align with organizational risk posture and compliance ... data governance and encryption. + Stay abreast of new technology and all growing aspects of Data Security and...the design, testing, implementation, and support of data security controls that align with corporate and regulatory compliance. +… more
- L3Harris (Colorado Springs, CO)
- …and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body ... systems, networks, and database products. Uses methods such as encryption technology , vulnerability analysis and security management. Responsible for integration of… more
- L3Harris (Palm Bay, FL)
- …and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body ... systems, networks, and database products. Uses methods such as encryption technology , vulnerability analysis and security management. Responsible for integration of… more
- L3Harris (Palm Bay, FL)
- …and authorization (A&A) processes to include RMF steps 1-4 (categorization, controls selection, control implementation, security assessment) and standard body ... systems, networks, and database products. Uses methods such as encryption technology , vulnerability analysis and security management. Responsible for integration of… more
- USAA (San Antonio, TX)
- …Information Security is integrated across the enterprise. Conducts comprehensive technology research to evaluate potential vulnerabilities in Enterprise systems. ... are effectively identified, measured, monitored, and controlled. Follows written risk and compliance policies and procedures for business activities. Leads… more
- Huntington Ingalls Industries (Nellis AFB, NV)
- …HII-MT provides mission-critical engineering and technical service to Information Technology , Federal Civilian, and National Security, Aerospace & Defense and ... locations worldwide. What You Will Do: + Draft, review, and update Risk Management Framework(RMF)artifacts required for achieving a Authority to Operate (ATO) for… more