may change at any time. Responsibilities As a Third Party Risk Management (TPRM) Analyst, you will be a subject matter... and vulnerability management, and cross-functional security and privacy control assurance. You will be responsible for owning...
IMF’s IT function. The candidate is expected to bring pragmatic risk-based technical security controls management... including but not limited to IAM, secure CI/CD pipeline, data security/protection, incident management, vulnerability management...
International Monetary Fund& Change Management, and Strategy & Transformation. Why do we do it? Our define the CVP culture, guide our decisions.... We are seeking a Security Analyst to join our team of experts tasked with securing the critical networks and systems our clients...
CVPIndividual must interact extensively with all levels of management, business and IT, and is required to act in a professional...Senior Cyber Threat Intel Analyst Washington D.C. / Hybrid Job Overview Candidate is applying for a Senior Cyber...
Scout Solutionscontinuity processes and tools needed. i. Active Directory service management and operational stability and maintenance j... and provides basic engineering and technical support in solving these problems. m. Performs vulnerability/risk analyses...
Go intellects Incwith Vulnerability Management tools like Qualys and Nessus 9.Co-ordinate with Patching team and assist them with patching... (Infrastructure Group) will be maintaining and monitoring day to day operation of the OCFO IT infrastructure Security. 2.The IT...
Go intellects IncFramework (RMF). Maintaining and tracking system POA&Ms. Conducting vulnerability management and analysis. Reviewing... such as vulnerability management (e.g., Nessus), configuration management (e.g., BigFix, SCCM, ePO), endpoint protection (e.g., antivirus...
AnaVationof security solutions including vulnerability management, endpoint security, security information and event management... security appliance administration and cloud security. · Experience with vulnerability scanners and management, preferably...
Zachary Piper SolutionsManagement Framework, IT security, infrastructure, vulnerability assessment, reporting, firewalls, VPN, Data Loss Prevention, IDS..., technical writer, business analyst, technical analyst, technology write, air force, digital forensics, project management, jira...
Zachary Piper Solutionsregulation, FIPS standards, NIST 800 series, NIST Special Publications, Risk Management Framework, IT security, infrastructure..., business analyst, technical analyst, technology write, air force, digital forensics, project management, jira, army, military...
Zachary Piper Solutionstrust, supply chain, risk management, vulnerability management, etc. Industry Knowledge: Stay abreast of emerging trends... to Operate Risk Management: Provide oversight to ensure comprehensive risk assessments and vulnerability scanning...
General DynamicsUnderstanding of IT governance and management in the federal sector Understanding of information assurance, cybersecurity, privacy... Analyst) or the ability to obtain it once hired Work Schedule Ability to support work remotely Benefits Offered...
Criterion Systemsenterprise-grade security technologies, which perform critical functions such as vulnerability scanning, malware detection... management (SIEM). Some examples of the 20+ cutting-edge security technologies that the selected candidate will work...
Bering Straits Native Corporation, and enterprise-wide incident response and security information and event management (SIEM) tools. The analyst will be responsible... Bering Global Solutions, LLC (BGS) is a recognized leader in providing Technical and Program Management Services, Information...
Bering Straits Native Corporation