- American Express (Phoenix, AZ)
- …drive least privilege. We are seeking a candidate with a solid grasp of information security and technology controls. **Job Responsibilities** + This is a ... Participates in the development of plans and strategies for information security processes, and programs. + Perform...of data pipelines and reporting. + Strong command of SQL for data querying, filtering and transformation. Comfortable with… more
- Citigroup (Tampa, FL)
- …analysts **Qualifications:** + At least 4+ year relevant years of experience in Business Analyst role with SQL + Strong background in financial reference data ... The Senior Technology Business Analyst is an intermediate level position responsible for...standards, and make evaluative judgement + Recommend and develop security measures in post implementation analysis of business usage… more
- Aflac (GA)
- Platform Business Analyst ( SQL /Snowflake) The Company: Aflac Columbus The Location: Remote, US, 31999 GA, US, 31999 The Division: Digital Services Job Id: 7587 ... Platform + Integration with External Systems and APIs + SQL , Snowflake + Mulesoft + Performance Tuning for Specific...& Experience Required + Bachelor's Degree in Computer Science, Information Systems or other related field + Two or… more
- Insight Global (Nashville, TN)
- …support for any technical issues that impact the Retail Systems Bachelors degree in Information Security or related field of study preferred. Experience with web ... Job Description A client in the Nashville area is looking for a Programmer Analyst with expertise in PL/ SQL to work on a permanent basis. This person will be… more
- Lincoln Financial (Greensboro, NC)
- …and falsified offer letters. Lincoln will not ask applicants to provide their social security numbers, date of birth, bank account information or other sensitive ... stories for the agile team to execute. + Organize information to create data models, source-to-target mappings, and solution...application platforms and developer tools: + Technical Writing + SQL + Informatica + Python & PySpark + Data… more
- Epsilon, Inc (Falls Church, VA)
- ** Information Security Analyst II** **Who is Epsilon:** Epsilon is an IT Services company that was founded in 2009 and has become an established leader in ... home based on business needs. **An average day:** As Information Security Analyst II, you...and endpoint protection solutions. + Familiarity with Python scripting, SQL and automation tools for security -related tasks.… more
- University of Texas Rio Grande Valley (Edinburg, TX)
- Position Information Posting NumberSRGV8169 Working TitleNETWORK SECURITY ANALYST III Number of Vacancies1 LocationEdinburg, Texas DepartmentInfrastructure & ... security systems on multiple University campuses to identify information security incidents and compromises and provide...experience in performing data networking analysis as a Network Security Analyst , System Analyst , System… more
- Meta (Menlo Park, CA)
- **Summary:** Meta is seeking an experienced InfoSec, Access Management Analyst to join the Information Security team. This position will be responsible for ... of complex system problems and meet evolving business and security needs. As a Security Analyst...have a good understanding of the broad aspects of information security and apply that knowledge to… more
- Marotta Controls, Inc. (Parsippany, NJ)
- …a company where your work supports a mission that makes a difference-apply today ! Information Security Analyst - Level 1 ESSENTIAL FUNCTIONS The ... Information Security Analyst is responsible for the analysis,...to read and understand code, specifically JavaScript, Python, and SQL . + Well-developed practical operating knowledge of common desktop/laptop… more
- General Dynamics Information Technology (Colorado Springs, CO)
- …SCI + Polygraph **Public Trust/Other Required:** None **Job Family:** Cyber Security **Skills:** Cybersecurity, Information Security ,System Security ... government's mission. This position requires a solid understanding of cyber threats and information security in the domains of TTP's, Threat Actors, Campaigns,… more