- Bank of America (Washington, DC)
- …using data analytics and partnering with internal teams to verify policy compliance , identify gaps in coverage, and support remediation activities. **LOB Overview:** ... operates global security operations centers that monitor, detect, and respond to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a… more
- Roche (Indianapolis, IN)
- …to improving your work to increase productivity, reduce costs or mitigate significant compliance issues within your area of influence. You work as a strategic ... + You are able to identify improvements and implement through collaboration with your manager . + You act as a coach for colleagues with less experience and help… more
- Alaka'ina Foundation Family of Companies (Washington, DC)
- …into compliance . + Hands-on experience with Microsoft Endpoint Configuration Manager (MECM) specifically with the following: + MECM Deployment and Management + ... Responsible for supporting the personnel, applications, and appliances employed to maintain compliance with all regulatory requirements to include but not limited to… more
- GovCIO (Alexandria, VA)
- …and automate executive-level dashboards and reports to visualize ZT performance, compliance posture, and risk reduction using data visualization tools (eg, Power ... in ZT policy enforcement. + Collaborate with ZT architects, security engineers, and compliance teams to ensure data requirements are met and that metrics accurately… more
- Insight Global (Kennesaw, GA)
- …excellence and innovation, advancing technologies such as AI, automation, cloud, and cybersecurity while ensuring regulatory compliance . As a strategic partner ... * Sponsor and lead major change programs, mobilizing teams through uncertainty. Governance, Compliance & Risk * Ensure compliance with all internal and external… more
- Emory Healthcare/Emory University (Atlanta, GA)
- …Cyber Defense Team. This role is responsible for overseeing cybersecurity detection engineering, managing threat intelligence and Emory's vulnerability management ... incident response, vulnerability management, intrusion detection and prevention, regulatory compliance , and security operations. + Drafts and reviews information… more
- US Courts (Washington, DC)
- …Planning and Administration: Advise and recommend to the IT Support Manager technology strategies, emerging requirements, and capabilities including anticipation of ... with the court's cyclical preplacement policy. Collaborate with the IT Support Manager to assess and identify hardware, software, and cloud service requirements… more
- Trace Systems Inc (Shaw AFB, SC)
- …and patch network equipment, firmware and software to ensure configuration and cybersecurity compliance ; + Operate and maintain access control systems; and ... VTCs, DVTCs, peripherals, etc.) from networks; + Operate and maintain call manager (Cisco Unified Communications Manager ); implement add, moves and changes;… more
- Trace Systems Inc (Shaw AFB, SC)
- …and patch network equipment, firmware and software to ensure configuration and cybersecurity compliance ; + Operate and maintain access control systems; and ... VTCs, DVTCs, peripherals, etc.) from networks; + Operate and maintain call manager (Cisco Unified Communications Manager ); implement add, moves and changes;… more
- TekSynap (VA)
- …audiences. + Deep understanding of cloud security, DISA STIGs, IAVA compliance , and DoD cybersecurity principles. + Experience preparing comprehensive ... **RESPONSIBILITIES** + Serves as the Management Information System (MIS) Manager responsible for the design, development, and management of enterprise-level… more