- Ally (Harrisburg, PA)
- …your opportunities be, too? **The Opportunity** As an Analyst I on the IT / Cyber Risk team, the qualified candidate is responsible for completion of ... required IT / Cyber Risk activities (testing of IT processes/applications/asset classes, risk assessment and/or risk reporting) as assigned. The… more
- Ally (Harrisburg, PA)
- …your opportunities be, too? **The Opportunity** As an Analyst II on the IT / Cyber Risk team, the qualified candidate is responsible for performing testing ... years of experience in IT Audit, IT Risk Management, Information Security or Cyber Security required * Experience in the banking industry, preferred. *… more
- Duquesne Light Company (Pittsburgh, PA)
- …Research, investigate, communicate, and integrate actionable threat intelligence information in DLC Cyber Security Operations and IT systems. + Perform all other ... DLC is seeking candidates for the role of Sr. Information Security Analyst I on the Cybersecurity Operations ("CyberOps") team, directly supporting NERC CIP… more
- Duquesne Light Company (Pittsburgh, PA)
- …Research, investigate, communicate, and integrate actionable threat intelligence information in DLC Cyber Security Operations and IT systems. + Ensure DLC's ... DLC is seeking candidates for the role of Senior Information Security Analyst II on the Cybersecurity Operations ("CyberOps") team, directly supporting NERC CIP… more
- Deloitte (Harrisburg, PA)
- … Security vigilantly protects Deloitte and client data. The team leads a strategic cyber risk program that adapts to a rapidly changing threat landscape, changes ... the security of information systems within the organization. The GPS BISO Analyst ensures compliance with relevant regulations and standards, including NIST 800-53,… more
- Geisinger (Danville, PA)
- …+ Leads the implementation of a sustainable and effective process to monitor cyber -threat intelligence as reported by various public, IT product vendors, ... threats and unauthorized activity. + Gathers, monitors, analyzes and reports observed cyber -threat activity as reported by various public, IT product vendors,… more