- Black & Veatch (Charlotte, TX)
- … management operating model, DERMS solution architecture, and Advanced Distribution Management Infrastructure + Work with clients to document and/or discover ... Operational Technologies (OT) transformation especially around Distributed Energy Resource Management System (DERMS), Virtual Power Plant (VPP), Advanced Distribution… more
- Deloitte (Dallas, TX)
- Cyber Digital Identity and Access Management Okta Senior Consultant Are you interested in working in a dynamic environment that offers opportunities for professional ... to help our clients tackle those unique challenges. Identity and Access Management (IAM) solutions leverage Deloitte's IAM Methods 2.0 methodology to help clients… more
- CyrusOne (Dallas, TX)
- …proactive expert with a strong background in security technology, project management , and construction delivery, ensuring compliance with industry standards and ... assessing risks while maintaining effective vendor relationships. **Responsibilities:** Project Management : + Lead the planning, execution, and delivery of security… more
- CGI Technologies and Solutions, Inc. (Houston, TX)
- …be able to collaborate with a variety of technical and management disciplines including infrastructure and security architecture, security operations, application ... routine security status reports * Coordinate and participate in the preparation of document packages for regulatory submissions from all areas of company as well as… more
- HP Inc. (Spring, TX)
- …Communication:** Communicate audit findings, recommendations, and risk insights to senior management and key stakeholders. Provide timely updates on audit progress ... of Control Changes:** Collaborate with control owners to identify and document changes to internal controls, ensuring alignment with evolving business processes… more
- Deloitte (Austin, TX)
- Cyber Digital Identity and Access Management CIAM Manager Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in ... with confidence, and proactively manage to secure success. Identity and Access Management (IAM) solutions leverage Deloitte IAM Methods 2.0 methodology to help… more
- Comerica (Dallas, TX)
- …and colleagues. BRCOs are critical to the success of the Risk Management Lifecyle and play a role in Planning, Identifying, Assessing, Mitigating, Monitoring, ... business relevant implementation of Second Line of Defense (2LOD) risk management frameworks, policies, taxonomies, and inventories. Review, validate, and test 1LOD… more
- Comerica (Dallas, TX)
- …and colleagues. BRCOs are critical to the success of the Risk Management Lifecyle and play a role in Planning, Identifying, Assessing, Mitigating, Monitoring, ... business relevant implementation of Second Line of Defense (2LOD) risk management frameworks, policies, taxonomies and inventories. Review, validate, and test 1LOD… more
- Comerica (Dallas, TX)
- …and colleagues. BRCOs are critical to the success of the Risk Management Lifecyle and play a role in Planning, Identifying, Assessing, Mitigating, Monitoring, ... business relevant implementation of Second Line of Defense (2LOD) risk management frameworks, policies, taxonomies and inventories review, validate, and test 1LOD… more
- Comerica (Dallas, TX)
- …and colleagues. BRCOs are critical to the success of the Risk Management Lifecyle and play a role in Planning, Identifying, Assessing, Mitigating, Monitoring, ... business relevant implementation of Second Line of Defense (2LOD) risk management frameworks, policies, taxonomies, and inventories. Review, validate, and test 1LOD… more