- Bank of America (Jersey City, NJ)
- …reporting, and automation of third-party data reports within the Third-Party Cyber Assurance Program (TPCA). Key responsibilities include analyzing and interpreting ... with an information security lens + Identify root causes and proactively identify risk and thematic trends in the vendor population + Collaborate with partners in… more
- L3Harris (Malabar, FL)
- …deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Senior Associate, ... problems as they are discovered to the primary material manager or appropriate function, for resolution or as directed....by the function. * Perform basic internal supply chain risk and opportunity assessments with the assistance of MM… more
- Truist (Raleigh, NC)
- …+ Provide leadership and direction to ensure program elements including risk assessments, application development, project management, and ongoing operations reflect ... management, firewalls, security awareness training, etc. + Ability to understand audit requirements and produce evidences/reports as needed. + Excellent ability to… more
- M. C. Dean (Caroline County, VA)
- …is _Building Intelligence(R)_ . We design, build, operate, and maintain cyber -physical solutions for the nation's most recognizable mission critical facilities, ... in a timely manner on the proper cycle 3. Audit the counts and inventories of others 4. Research...valuable, critical, or long-lead items at the expense of low- risk items that are easily replaced if misplaced. 8.… more
- L3Harris (Sterling, VA)
- …deliver end-to-end technology solutions connecting the space, air, land, sea and cyber domains in the interest of national security. Job Title: Lead, Information ... System Security Officer (ISSO) to support the Information System Security Manager (ISSM) in securing government-authorized systems. The ISSO will be responsible… more
- Lockheed Martin (King Of Prussia, PA)
- …work\! \- You will have the opportunity to engage in all aspects of the cyber discipline \- You can enjoy a work\-life balance that allows for flex hours and ... IS in accordance with internal LM and customer security requirements, primarily Risk Management Framework \(RMF\)\. \- Upkeep, monitor, analyze, and respond to… more