a risk-based approach to manage information security related aspects of HRT's business. Assuring compliance with information... security, privacy and industry standards and regulations. Maintaining the process of establishing reasonable organization...
Hampton Roads TransitSecurity Assessments will include Security Control Assessments (SCAs), Risk Assessment (RA) and analysis, evaluations... systems. Utilize structured mini teams to complete SA and Risk Assessment (RA) Activities. Assess all applicable security...
Zermount, Incwhile ensuring translation of the Product Manager’s vision and outcomes into stories. The Product Owner has an important role in..., and is empowered to “accept” completed stories. The Product Owner for Digital Workplace Security Operations is a member of the...
Federal Reserve BankManager and will be part of a team of Information Security professionals that is customer-focused, passionate for information... (FRS) for Information Security; to be “agile, risk-focused and forward-looking to ensure sustained security and resiliency...
Federal Reserve BankData Security Officer for the College. Develop and oversee a risk-based institutional research data security program..., such as Certified Information Systems Security Professional (CISSP) or Certified Information Security Manager (CISM). Proven experience...
Baylor College of Medicineas a Security Manager and make your mark in the tech industry. This role is designed for a seasoned leader with a deep understanding... knowledge and experience of product/solutions security, and understanding of security and privacy by design principles...
Ericssonto risk assessments, privacy impact assessments, and security plans. Validate compliance of documentation with government... Payment Program, and Medicaid Utilization Management Position: Senior Information Security Analyst Location: ONSITE in in...
Vision It USand program staff about proper security practices. The ISSO conducts security and risk assessments as required using...)), and works to mitigate risks by applying security controls effectively to achieve an acceptable degree of operational risk...
Leidosand program staff about proper security practices. The ISSO conducts security and risk assessments as required using...)), and works to mitigate risks by applying security controls effectively to achieve an acceptable degree of operational risk...
Leidosand overseeing any vulnerability audits, risk assessments, and other IT security projects and audits. The IT Security Engineer... as well as risk mitigation. Maintain the Change Control process. Manage projects related to IT security and Governance...
Brooks Rehabilitation, and risk management. Will perform computer security functions as assigned, including preparation and submission of System... as an Information Systems Security Manager (ISSM) or Information Systems Security Officer (ISSO) Working knowledge of the aspects...
Raytheon Technologiesof Security Operations and IT Risk Assessment. Purpose Under the direction of the Manager of Enterprise IT Security... Oversight, IT Risk Assessment, Security Engineering, and Security Operations and focus in depth upon the domain requirements...
University of Texas at Austinwith data governance frameworks and practices to ensure data quality, privacy, and security. Audit and Reporting... of control security risks and threats; potential of one more controls subject to manager discretion. Shares knowledge with staff...
PNC Financial Serviceswe envision. Summary Cyber Security Program Administrator Position Highlights: The Cyber Security Program Manager... security program and be responsible for ensuring that those efforts adhere to established cyber security industry...
Moffitt Cancer Center: Familiarity with data governance frameworks and practices to ensure data quality, privacy, and security. Audit and Reporting... enforcement of control security risks and threats; potential of one more controls subject to manager discretion. Shares knowledge...
PNC Financial ServicesEl Segundo. The successful candidate will interface with the Information Systems Security Manager (ISSM) to ensure adherence...) Security Manuals Risk Management Framework (RMF) Intelligence Community Directive (ICD-503) Joint Special Access Program...
Raytheon Technologieswith risk acceptance criteria of organization. Evaluation of third party components regarding product & solution security...). Represent customer project towards customers security representatives, align with customer's security and risk strategy...
Siemens Gamesa Renewable Energy