- News Corp (New York, NY)
- …ideal candidate will have a robust understanding of cybersecurity and data protection principles and be well-versed in the risk management lifecycle. **Key ... assess risks in various projects and initiatives, conduct thorough risk assessments, and manage cyber issues and...initiatives, conduct thorough risk assessments, and manage cyber issues and risks effectively. A business-focused view of… more
- OneMain Financial (Baltimore, MD)
- …monitor case volume trends, and sentiment feedback across service areas . Ensure proper protection of PII and other sensitive HR data through scoped apps, ACLs, ... encryption, and retention enforcement **Cybersecurity, Risk , and Compliance Enablement** . Equip Cyber and GRC teams with automation pipelines, policy… more
- Travel + Leisure Co. (Orlando, FL)
- … cyber threats + Develop a qualitative and quantitative analysis program for cyber threat & intelligence data gathering to identify threat actors' motives, ... targets, and intentions. + Maintain, develop, and continuously evaluate cyber threat intelligence sources (technical & non-technical) to increase effectiveness … more
- Leidos (Ashburn, VA)
- …aspects of IT Security in a complex enterprise environment. Additional experience in cyber risk management and assessments will be considered. + Deep working ... **Description** The US Department of Homeland Security (DHS), Customs and Border Protection (CBP) Security Operations Center (SOC) is a US Government program… more
- World Wide Technology (St. Louis, MO)
- …implementing and maintaining the tools and capabilities used to ensure the security and protection of sensitive data within our organization. You may also assist ... frameworks, and regulatory requirements to ensure ongoing compliance and innovation. + ** Data Loss Prevention (DLP) & Information Protection ** + Serve as… more
- Cisco (Washington, DC)
- …including investigations, analysis, vulnerability management, security architecture, threat intelligence, cyber legal, data protection , and compliance, ... ASM service unifies tooling sources of truth, mis-configurations, and vulnerability data collected to enable executive accountability and track the prioritized… more
- Huntington Ingalls Industries (Fairfax, VA)
- …be able to understand technologies, their purpose, and their security requirements and data protection needs, wherever they reside. BISOs should also understand ... customers. Our capabilities range from C5ISR, AI and Big Data , cyber operations and synthetic training environments...the business across multiple services and platforms to address risk , while advising business leaders to ensure they are… more
- General Dynamics Information Technology (Tyndall AFB, FL)
- …+ Experience with Cyber Security Service Provider implementation + Experience with DoD Cyber Protection Team **GDIT IS YOUR PLACE** At GDIT, the mission is ... Able to Obtain:** Secret **Public Trust/Other Required:** None **Job Family:** Cyber and IT Risk Management **Skills:** Security Controls,Security… more
- Deloitte (Baltimore, MD)
- Our Deloitte Cyber team understands the unique challenges and opportunities businesses face in cybersecurity. Join our team to deliver powerful solutions to help our ... manage to secure success. Work You'll Do + Implement risk management programs for our federal clients by utilizing...utilizing NIST, RMF, and FISMA compliance frameworks. + Enhance cyber awareness with clients and project teams. + Work… more
- Carle Health (Urbana, IL)
- …Vice President of Information Security/CISO reports directly to the SVP, Chief Risk Officer and will oversee the enterprise-wide security program. The security ... program includes Governance, Risk and Compliance ("GRC"), Disaster Recovery Management, Identity and...("GRC"), Disaster Recovery Management, Identity and Access Management and Cyber Operations. The CISO must have a strong technical… more