- Deloitte (Denver, CO)
- …capabilities + Participate in client presentations and technical discussions The Team: Our Cyber Strategy & Transformation offering develops and transforms ... agendas through proactive management of the associated business and cyber risks. As a Manager , you'll provide...associated business and cyber risks. As a Manager , you'll provide consulting and implementation services that integrate… more
- Deloitte (Denver, CO)
- …Customer Identity & Access Management (CIAM) solutions aligned to Client's digital transformation strategy . Manage operations for client's needs across multiple ... Cyber Digital Identity and Access Management CIAM Manager Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in… more
- Proofpoint (Denver, CO)
- …future-focused problem-solving, Exceptional in execution and impact. **Reports To:** Sr. Manager , Worldwide Sales Operations **About Us** Proofpoint is a leading ... biggest risks: their people. We provide cutting-edge solutions to defend against cyber threats, protect data, and ensure compliance. Our team is passionate,… more
- Bank of America (Denver, CO)
- Evaluation Manager (Cybersecurity) Denver, Colorado;Washington, District of Columbia; Chicago, Illinois **To proceed with your application, you must be at least 18 ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Denver/Evaluation- Manager --Cybersecurity-\_25028823) **Job Description:** At Bank of America, we are… more
- Bank of America (Denver, CO)
- …data, and customer information. GIS develops the bank's Information Security strategy and policy, manages the Information Security program, identifies and addresses ... toll- gating processes, and early engagement and security consulting on critical transformation initiatives. A key requirement to ongoing success is to understand… more
- Bank of America (Denver, CO)
- …PAM trends and engages peer organizations to refine and enhance BAC's PAM strategy . + Apply industry PAM best practices, templates, and documentation while also ... Global Information Security (GIS) functions, Core Technology Infrastructure (CTI), Cyber Security Technology (CST), Third Party management, Global Compliance and… more