- Microsoft Corporation (Redmond, WA)
- …machine learning, and analytics techniques to tackle complex problems such as fraud /anomaly detection , opportunities and business impact analytics. + Design E2E ... solutions and drive projects from concept to production in a fast-paced, dynamic environment. **Qualifications** **Required Qualifications:** + Bachelor's Degree in Statistics, Econometrics, Computer Science, Electrical or Computer Engineering, or related… more
- TE Connectivity (Berwyn, IL)
- …and regulations + Develop audit procedures for the prevention, identification, and detection of fraud ; ensure all observations, findings and conclusions are ... Audit Manager, the Forensic Auditor will conduct investigations of allegations of fraud and other non-compliance matters at TE Connectivity locations globally. The… more
- Idaho Division of Human Resources (Pocatello, ID)
- …Knowledge of Generally Accepted Accounting Principles. + Basic knowledge of controls for fraud prevention and detection . + Intermediate level knowledge of Idaho ... or information technology components. Work can also include investigating allegations of fraud , waste and abuse. + Completes all assignments within established time… more
- Experian (Allen, TX)
- …the world. We help to redefine lending practices, uncover and prevent fraud , simplify healthcare, create digital marketing solutions, and gain deeper insights into ... Learn more at experianplc.com. The Technical Program Manager (TPM) for the Threat Detection Engineering team will be at the intersection of cybersecurity and program… more
- Intuit (Plano, TX)
- **Overview** We are seeking a talented Detection Engineer to join our Security Incident Response Team (SIRT) and help us protect our organization from cyber threats. ... ideal candidate will have a deep understanding of security detection techniques and be able to design, implement, and...analytics teams in a compliance, security, risk, or financial fraud environment + Developer experience in Python or comparable… more
- HP Inc. (Austin, TX)
- …becomes more connected and more digital, there are increased opportunities for fraud and disruption due to cybersecurity attacks. The need for companies, products, ... a difference with us! **What does a Cybersecurity Threat Detection & Response Engineer do at HP:** + Uses...threats. + Familiarity with Security Analytics Platforms and Endpoint Detection & Response (EDR) Platforms + Knowledge and experience… more
- Cummins Inc. (GA)
- …authentication/authorization, user self-service, data security, privacy and consent management, fraud and attack detection , session and token management, ... reporting etc. + Work to understand the IT enterprise architecture and collaborate with the architecture team to ensure the CIAM/IAM security standards are created and adopted into the Enterprise Architecture frameworks + Conduct industry and market research… more
- Sarasota County Government (Sarasota, FL)
- …delivered with the utmost respect and courtesy. + Manage proactive assessments of fraud awareness, prevention, detection and risk mitigation activities in area ... of responsibility. + Collaborate with co-workers to evaluate the volunteer needs for each service center (for example: Library branches, Historical Resources, Technical Services, Info Central, Administration). + Develop resources for and conducts training… more
- Google (New York, NY)
- …the world's security telemetry and enhances user abilities across security investigations, fraud and abuse detection , analysis, response, prevention and broad ... compliance audits. You will solve various security issues on one platform, giving customers the advantage in their fight against cybercrime. Google Cloud accelerates every organization's ability to digitally transform its business and industry. We deliver… more
- United Airlines (Chicago, IL)
- …OpenID Connect (OIDC,) OAuth, SAML, AD-Fed, API Gateways, SCIM + Knowledge of fraud prevention and detection , Access management, identity proofing and identity ... verification technologies + Expertise of modern software lifecycle development and automated cloud infrastructure deployment + Understanding of policies that reflect system security objectives + Ability to determine how a security system works (including its… more