- RELX INC (Philadelphia, PA)
- …about identifying and managing third-party risks that could impact business continuity, security , or compliance? About the role , the Senior 3rd Party Risk ... Analyst will analyze risks and help operate the enterprise security program, including vendor risk management. This role supports Elsevier's Information Security … more
- ARAMARK (Pittsburgh, PA)
- **Job Description** The Security Worker Lead is responsible for maintaining the security of people and/or property in the assigned area(s). Responsibilities may ... site regulations, reporting safety hazards, assisting with traffic control, etc. The Security Worker Lead may be responsible for the oversight or delegation of… more
- Lockheed Martin (King Of Prussia, PA)
- …a government security investigation and must meet eligibility requirements for access to classified information, and must maintain the required security ... challenge, and you want to support a critical space security mission, the Echo Program Area is the place...candidate must have an active Top Secret / SCI security clearance prior to start\.** **This is a MID… more
- Grant Thornton (Philadelphia, PA)
- …needs by applying a collection of information and cybersecurity capabilities, including security and privacy, strategy, governance, IT risk, security testing, ... capability assessments, cyber threat and risk assessments, network and security architecture reviews, compliance and regulatory assessments, and system configuration… more
- CVS Health (Somerset, PA)
- …and adhered to including, but not limited to: CCTV operation, access control, alarm system functionality/testing/response, cargo/trailer security measures. + ... Protection programs, policies, and procedures. Responsibilities include ensuring the security of company assets (including employees, building, product, supplies,… more
- M. C. Dean (Tobyhanna, PA)
- …organizations. MC Dean's capabilities include electrical, electronic security , telecommunications, life-safety, instrumentation and control, and command ... responsibilities include but are not limited to: + Manage security installation projects, typically involving 5 to 10 persons...project productivity + Plan and obtain permits, badges, and access requests in advance + Plan and maintain manpower… more
- TekSynap (New Cumberland, PA)
- …to ensure accurate and appropriate use of data. + Advises users on access to various client/server databases. + Designs, implements, and maintains complex databases ... with respect to JCL, access methods, access time, device allocation, validation... time, device allocation, validation checks, organization, protection and security , documentation, and statistical methods. + Applies knowledge and… more
- Select Medical (Mechanicsburg, PA)
- …+ Participate in relevant information-sharing activities. + Monitor and report on any security violations related to the unwarranted access to corporate data. + ... Ensure that all problems are resolved in a timely and efficient manner. + Help build team spirit by assisting other staff members and promoting a positive workplace. + Maintain awareness of the rapidly changing environment and recommend cost efficient… more
- Carnegie Mellon University (Pittsburgh, PA)
- …you excited about working for an FFRDC focused on areas critical to national security ? Do you want to join a collaborative team that develops and uses best-in-class ... serves as a national resource in software engineering, computer security , and process improvement. The SEI works closely with...including eligibility for and willingness to apply for Special Access Programs (SAPs). + You have a BS in… more
- Select Medical (Mechanicsburg, PA)
- …+ Participate in relevant information-sharing activities. + Monitor and report on any security violations related to the unwarranted access to corporate data + ... Ensure that all problems are resolved in a timely and efficient manner. + Maintain awareness of the rapidly changing environment and recommend cost efficient techniques. + Create, maintain and update disaster recovery procedures when changes in hardware or… more