- Hackensack Meridian Health (Hackensack, NJ)
- …Google Suite platforms. **Education, Knowledge, Skills and Abilities Preferred** : + Experience in health information or health care or related field. If you ... A day in the life of a **Deficiency Trackg/Suspension Analyst ** at Hackensack Meridian Health includes: +...and ensures that each page has the correct patient information . + Prepares medical records for scanning … more
- Hackensack Meridian Health (Edison, NJ)
- …Management (VM)** Program's objective is to reduce Hackensack Meridian Health 's (HMH) risk profile through the proactive identification, prioritization, and ... comprehensive manner across systems (Host, Application, Database, etc.). The Cybersecurity Analyst IV, VM is responsible for handling the day-to-day operations of… more
- Hackensack Meridian Health (Edison, NJ)
- …architecture technology solutions such as firewalls, intrusion prevention systems, Security Information and Event Management (SIEM), vulnerability scanning and ... healthcare and serve as a leader of positive change. The **Cybersecurity Analyst III, Security Operations (Sec Ops)** is responsible for maintaining the security… more
- WSP USA (New York, NY)
- …We have an exciting opportunity for a highly experienced Attack Surface Reduction Analyst with prior leadership experience to join our global SOC Tools and ... can be based out of any WSP USA office. The Attack Surface Reduction Analyst will play a critical role in enhancing our organization's cybersecurity posture by… more
- WSP USA (New York, NY)
- …seeking an experienced, meticulous and detail-oriented Data Classification and Labeling Analyst to join our Security Engineering and Operations team. The successful ... mail flow rules) + Prioritize and onboard data sources for scanning (eg, structured, unstructured data across applications, databases, file shares, cloud… more
- City of New York (New York, NY)
- …between the people and its police, and by pioneering strategic innovation. The Information Security team within ITB is a highly specialized group of cyber security ... This includes, but not limited to, user access and controls, vulnerability, scanning , cyber threat intelligence gathering, and incident response. The Information … more