- ECOLAB (St. Paul, MN)
- …existing security initiatives. Collaborate with internal partners and manage third - party vendors and contractors. Be available for on-call responsibilities ... teams. Deliver training on emergency preparedness, report writing, incident management, and risk mitigation. Identify trends and patterns using security tools to… more
- Robert Half Technology (Houston, TX)
- …security measures across networks, endpoints, and cloud environments. + Collaborate with third - party partners to monitor, analyze, and respond to security ... intelligence feeds. + Manage penetration testing and vulnerability assessments with third - party providers and implement recommended fixes. + Administer… more
- Guidehouse (Arlington, VA)
- …for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring ... such as security and privacy assessments and continuous monitoring + Cloud Security principles and techniques + Supply Chain Risk Management and Acquisition … more
- Bath & Body Works (Columbus, OH)
- … security misconfigurations. + Maintain an inventory of cloud resources and third - party integrations. + Conduct initial analysis of suspected cloud ... help the world live more fully. The Senior Cloud Security Engineer will lead the detection, response, and remediation...nature and scope of the incident. + Work with third - party vendors to reduce and/or mitigate the… more
- Oracle (Bismarck, ND)
- …as it applies to data center security 2. Working with 3rd party security service providers maintains oversight for the recruitment, selection, orientation, ... to join our team. Oracle utilizes internal owned data center locations and third - party external data centers managed by co-location service providers. This… more
- Guidehouse (Washington, DC)
- …for participation in a recruitment event. Never provide your banking information to a third party purporting to need that information to proceed in the hiring ... Certified Authorization Professional (CAP), now part of the Certified in Governance, Risk and Compliance (CGRC), Certified Information Security Manager (CISM) +… more
- Oracle (Topeka, KS)
- … into project lifecycle, including cloud migrations, new application deployments, and third - party solutions. Define and maintain security policies, ... and tools to enhance protection of networks, applications, and data. Conduct security risk assessments, threat modeling, and architecture reviews for critical… more
- City and County of San Francisco (San Francisco, CA)
- …incident response, policy frameworks, compliance activities, threat and vulnerability management, and third - party risk management + Allocates and manages ... serves as a trusted advisor to senior leadership, providing expert guidance on risk management, security investments, and policy development. The CISO oversees a… more
- US Tech Solutions (Columbia, SC)
- …Senior Information System Security Officer (ISSO) will be responsible for leading Security , Risk , and Compliance activities in support of new and ongoing ... Duties and Responsibilities:** + Perform detailed architectural reviews and risk analysis of security related requests in...artifacts. + Serve as primary point of contact for third - party audits and/or assessments + of agency… more
- TEKsystems (Rosemont, IL)
- …goals. Ongoing monitoring, also. * Review AI architectural designs and usage within third - party products for compliance with security best practices, AI ... experience with Artificial Intelligence- FLEXIBLE on years * Ideally AI security risk assessment experience, but flexible and would consider security … more