- Regions Bank (Nashville, TN)
- …logging into the careers section of the system. **Job Description:** At Regions, the Cyber Security Architect contributes to the advancement of Regions' cyber ... and/or initiatives. **Primary Responsibilities** + Develops and establishes a strategic cyber security architecture and strategic vision, including standards and… more
- WestRock Company (Atlanta, GA)
- …Experience with published standards, guidance, best practices, profiles, and frameworks related to IAM and cyber security and practical implementation in an ... attack vectors and collaborating with the rest of IT organization * Security Analysis and advisory to the business How you will impact Smurfit Westrock: *… more
- Deloitte (Jericho, NY)
- …access to data. Qualifications Required: + BA/BS Degree in Computer Science, Cyber Security , Information Security , Engineering, Information Technology, ... prototyping, testing, training, defining support procedures + Lead implementation and advisory projects centered around leading IAM technologies such as… more
- Grant Thornton (New York, NY)
- …strategy. This includes supporting our clients to identify and understand their cyber risk exposure, design and implement cybersecurity programs and solutions to ... mitigate cyber threats...with our clients and deliver technical cybersecurity consulting and advisory services across a broad spectrum of areas, including… more
- Deloitte (Pittsburgh, PA)
- …be available. Preferred: + BA/BS Degree preferred. Ideally in Computer Science, Cyber Security , Information Security , Engineering, Information Technology. + ... proactively manage to secure success. Work you'll do Deloitte Cyber has an opening for a Cloud Security... security for clients. + Provide internal Azure security technical training to Advisory personnel as… more
- Kyndryl (Tallahassee, FL)
- …will focus on driving revenue growth in cybersecurity consulting by scaling high-impact security advisory services. We expect partners to contribute to industry ... knowledge in the following areas: + Zero Trust + Cyber Recovery + IAM / PAM +...ISO 22301, etc ) + Expertise in developing board-level security briefings and cyber risk reporting strategies… more
- Republic Airways (Indianapolis, IN)
- …of AD and IAM across the infrastructure. + Acts as information security subject matter expert; provides advisory and consulting services to business, IT ... experience. + 3 years of practical experience in architecting enterprise level cyber security solutions PREFERRED CERTIFICAIONS + (ISC)2 Certified Information… more
- Target (Brooklyn Park, MN)
- …and education to well-being and beyond at https://corporate.target.com/careers/benefits . **JOIN TARGET CYBER SECURITY AS A PRINCIPAL SECURITY ENGINEER / ... knowledge of Cybersecurity domains including: Cloud Security , Networking Security , Information Protection, Identity Access Management ( IAM ), Automation and… more
- Palo Alto Networks (Dallas, TX)
- …Architect, CISSP) strongly preferred **The Team** Unit 42 Consulting is Palo Alto Network's security advisory team. Our vision is to create a more secure digital ... Career** As a Senior Consulting Director within Unit 42's Cyber Risk Management (CRM) team, you will lead our...Risk Management (CRM) team, you will lead our Cloud Security Assessments offering and own the delivery success of… more
- ICF (Fort Meade, MD)
- …(eg, General Engineering, Computer Engineering, Electrical Engineering, Systems Engineering, Cyber Security , Information Technology, Information Security , ... Description **INFORMATION SYSTEM SECURITY OFFICER** ICF is hiring a cleared **Information...Required Qualifications** + Primary Certifications - DoDI 8570.01 Requirement, IAM II certification - one or more of the… more
- Capco, a Wipro Company (New York, NY)
- …leadership on key cybersecurity priorities, leveraging expertise in financial processes, strategic advisory , cyber programs, and security operations. **About ... Proficiency in cybersecurity domains such as Risk Assessments/Controls, Resilience, regulatory, Cloud Security , IAM , or Digital Trust. + Ability to leverage… more
- Capco, a Wipro Company (New York, NY)
- …leadership on key cybersecurity priorities, leveraging expertise in financial processes, strategic advisory , cyber programs, and security operations. **About ... standards and procedures across various domains (eg, Resilience, Data Security , IT Asset Management Governance, Digital Trust, IAM...Excel and PowerPoint + Bachelor's degree or higher in cyber or information security related field desired… more
- HCA Healthcare (Nashville, TN)
- …and on-going use of PAM systems and solutions with a focus on cloud IAM while adhering to HCA security standards, processes, and procedures. The individual ... individual will work closely with cross-functional teams, including IT administrators, security analysts and business stakeholders, to examine, translate and report… more
- Eliassen Group (Aberdeen Proving Ground, MD)
- …lists **Experience Requirements:** + The candidate must be familiar with DoD network and cyber security . + The candidate must be familiar with Risk Management ... . DoD 8570 certifications for IAT Level III or IAM Level II **_Rate: ($65 - $75 / hr....candidate must have hands-on experience with the myriad of cyber security tools employed within DoD architectures,… more
- Palo Alto Networks (Washington, CA)
- …6+ years of incident response or digital forensics consulting experience with a passion for cyber security + 3+ years in a cloud environment as an administrator, ... Cloud Platform (GCP), and AliCloud + Examine compute, storage, IAM , network traffic, serverless, and other log sources to...**The Team** Unit 42 Consulting is Palo Alto Network's security advisory team. Our vision is to… more
- Innovative Management & Technology Services (Reston, VA)
- Company Overview: Join a fast-growing company highly experienced in cyber security , cloud computing, virtualization, big data analytics, and project management! ... candidate will demonstrate advanced knowledge of enterprise-level software development, security requirements, and full lifecycle software engineering practices. This… more