- RTX Corporation (Richardson, TX)
- …team, you will partner and collaborate with multiple stakeholders, including Cyber , Engineering and Operations, to define critical DT capabilities in direct ... initiatives. + You will collaborate across multi-functional technical disciplines, including Cyber , Engineering, Operations and DT, to ensure the technical integrity… more
- RELX INC (Philadelphia, PA)
- …Officer Do you want to create strategies and chart a course for our Cyber progress? Are you interested in evangelizing our core information security tools and risk ... critical issues, creating strategies and charting a course for cyber progress. About the Role As a BISO for...our publishing heritage, we combine quality information and vast data sets with analytics to support visionary science and… more
- Gilead Sciences, Inc. (Foster City, CA)
- … principles; company policies and standards; and regulatory requirements as they pertain to data privacy . The person in this position will be required to ... policies, standards and documentation. + Contribute directly to the data privacy program strategy and roadmap +..., protection health information, policy violation, and / or cyber or other threat to the enterprise has occurred.… more
- BlueVoyant (College Park, MD)
- …as compute, storage, networking and security groups, virtual private clouds and identity management is required. We expect the candidate to have practical experience ... and Postgres/MySQL About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across both your organization… more
- NBC Universal (Englewood Cliffs, NJ)
- …Lead will be a critical team member within the new Versant Cyber organization. This individual is responsible for collaborating across Busisnes's HR, Legal ... and the entire cyber team, to oversee and execute complex investigations into...of security policy across the organization involving employee misconduct, data loss, IP theft, Content loss and other internal… more
- PNC (Pittsburgh, PA)
- …assessment outcomes, testing scenarios, and controls limitations * Exposure to data analytics, software/application engineering, or data management functions and ... the project management lifecycle * Understanding of how to apply data to monitor risk program effectiveness - Using data to identify changes in risk occurrences… more
- Rubrik (Washington, DC)
- …Know, acknowledge, and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and regulations; + Perform ... Security and AI company, operates at the intersection of data protection, cyber resilience and enterprise AI...Rubrik Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more
- Rubrik (St. Paul, MN)
- …Know, acknowledge, and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and regulations; + Perform ... Security and AI company, operates at the intersection of data protection, cyber resilience and enterprise AI...Rubrik Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more
- Rubrik (Springfield, IL)
- …Know, acknowledge, and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and regulations; + Perform ... Security and AI company, operates at the intersection of data protection, cyber resilience and enterprise AI...Rubrik Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more
- Rubrik (Dover, DE)
- …Know, acknowledge, and follow system-specific security policies and procedures; + Protect data and individual privacy per requirements and regulations; + Perform ... Security and AI company, operates at the intersection of data protection, cyber resilience and enterprise AI...Rubrik Security Cloud platform is designed to deliver robust cyber resilience and recovery including identity resilience… more