- Truist (Charlotte, NC)
- …+ Deep knowledge of: + Mainframe security, including access control , monitoring, integration with non-mainframe technologies, and virtualization; + Authentication ... and database security, including database activity monitoring and database access control technologies; + Encryption methods and technologies for data-in-transit and… more
- Truist (Charlotte, NC)
- …financial expertise, strategic partnership, and operational support across cybersecurity, fraud management, and AML technology. This role owns financial planning, ... across Truist Protection Services - including cyber platform modernization, fraud and transaction-monitoring innovation, AML technology optimization, and resiliency… more
- Lowe's (Mooresville, NC)
- …The primary purpose of this role is to work closely with the Audit Manager , Senior Auditor II, and project teams by actively participating in planning, developing ... significant risks. **What You Will Do** + Identifies and documents weaknesses in control design and processes that do not comply with regulations, laws, and… more
- Travelers Insurance Company (Raleigh, NC)
- …activities required to effectively evaluate claims, such as Subro, Risk Control , nurse consultants and fire or fraud investigators and other experts. ... training as request by field severity management. + COMMUNICATION/INFLUENCE: + Consult with Manager on use of Claim Coverage Counsel as needed. + Provide guidance to… more
- TD Bank (Wilmington, NC)
- …and regulations such as Bank Secrecy Act and Patriot Act to minimize risk and protect the customer + Verifies customers' identities by following customer ... day + Understands the importance of and follows dual control + Follows all security and audit measures to...bank tools and processes to detect, address and prevent fraud + Expected to complete all required in-classroom training… more
- Bank of America (Charlotte, NC)
- …post-exploitation tools for red team engagements. + Comprehensive knowledge of command-and- control frameworks like Cobalt Strike, Mythic, Havoc, and Sliver. + ... tactics, techniques, and procedures associated with malicious insider activity, organized crime/ fraud groups and both state and non-state sponsored threat actors. +… more