- CVS Health (Columbia, SC)
- …heart, each and every day. **Position Summary** The Enterprise Delivery & PCW IT Compliance Team is looking for a resource to become our **Identity and Access ... Management ( IAM ) Domain SME** . This person will help our...a key player in our day-to-day operations, navigate the Compliance workload and emerging priorities, and provide front-line support… more
- Highmark Health (Columbia, SC)
- …+ Certified Information Systems Security Professional (CISSP) + Certified Information Security Manager (CISM) + Certified in Risk and Information Systems ... requirements) This job directs and manages Identity and Access Management ( IAM ) services for the Enterprise. Provides leadership to the Organization's … more
- Guidehouse (Charleston, SC)
- …vulnerabilities for risks and propose and implement remediation actions or risk mitigation strategies; ensure appropriate security controls are in place that ... have experience assisting or developing system security policy and ensuring compliance of change management and configuration control processes. **What You Will… more
- US Tech Solutions (Columbia, SC)
- …partners, and other parties/stakeholders to provide recommendations for security and compliance risk mitigation efforts. **Required Knowledge/Skills:** + Must ... The **SCDHHS Office of Cybersecurity (OCS)** is responsible for the security and compliance of **SCDHHS Information Systems and Data** . OCS seeks an expert **Senior… more
- Black & Veatch (Columbia, SC)
- …plans, gap assessments, asset management strategies, investment plans, risk and resilience assessments, and maintenance strategies. **Key Responsibilities** ... and capital prioritization + Asset management plan development + Risk and resilience assessments + Serve as the project... and resilience assessments + Serve as the project manager or technical lead on asset management projects locally… more
- SOS International LLC (Shaw AFB, SC)
- …to the Authorization Official (AO) and Information Assurance Program Manager (IAPM) in protecting, detecting, characterizing, countering and mitigating unauthorized ... procedures. + Advise and assist organizations in the preparation of Risk Management Framework (RMF) documentation, Connection Approval Process (CAP), and Approval… more