Description: CCS Global Tech is a rapidly growing Information Technology company with a diverse portfolio of technology products and services and a large network of industry partnerships. With over 22 years of being a successful business with a global ...
27 days ago
Description: Be part of a team that unleashes the power of leading-edge technologies to help improve the health and well-being of those most vulnerable in our country and communities. Working at Gainwell carries its rewards. You'll have an incredible ...
a month ago
... design, develop, and maintain automated security playbooks, integrations, and workflows to ... enhance incident response and security operations. This role involves collaboration ... , and incident responders to streamline security processes and improve
4 days ago
... identifying, analyzing, and mitigating security risks across enterprise systems and ... will evaluate business strategies, research security standards, perform risk assessments, and ... conduct system security analyses. They will communicate ...
27 days ago
... to assess and manage vendor security risk, including:Contract and Compliance ... adherence to all contractual obligations.Security Control Evaluation: Evaluate the design ...
10 days ago
... to assess and ensure the security and compliance of our third ... obligations related to IT and security standards. This is a critical position ...
13 days ago
Description: Cyber security IT Auditor Location: Austin, Texas ... and analyze evidence such as security policies, system configurations, logs, and ...
17 days ago
... , etc.).Define and enforce security standards (RBAC, Pod Security Standards, vulnerability scanning ...
19 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
19 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
19 days ago
Description: Advanced security project management experience, extensive experience ... augmentation contractors, including Two Network Security Analyst, and one
19 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
20 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
20 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. Perform control ...
20 days ago
... Description As a member of the Security and Identity team, you will ... . It is fundamental to OCI's security posture and is a highly scalable ...
20 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and gove
23 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance.Perform control ...
23 days ago
... , with proven ability to assess security controls across networks, IAM, endpoint ... security, and incident response. Adept at ...
23 days ago
... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and governance. " Perform control ...
23 days ago
... with contractual, regulatory, and industry security standards. The role involves auditing ... : Review vendor contracts, SLAs, and security requirements for compliance. Audit technical ...
23 days ago