- Penn Medicine (Philadelphia, PA)
- …of remote work after the introductory period is complete_ . Summary: + The IAM Access Management Lead will oversee the modernization and ongoing ... hospital systems while enhancing user experience and maintaining stringent security standards. The Access Management Lead will work closely with IT… more
- Penn Medicine (Philadelphia, PA)
- …Civic Center Blvd. Philadelphia, PA** **Hours- M-F, Hybrid** **Summary:** + The Cybersecurity Identity Management Sr. Engineer reports to the Cybersecurity ... cybersecurity . (Required) + 2+ years of IAM cybersecurity experience. (Required) + 1+ years management /leadership...IAM solutions, including IGA, RBAC, AD, key and certificate management , access design and provisioning + Ability… more
- ManTech (Philadelphia, PA)
- …and update of incident response plans for Navy Operational Technology (OT) systems. + Lead a team of ISSMs/ISSEs to provide cybersecurity evaluations and risk ... in OT systems for hardening, patching, or other corrective actions. + Lead the remediation activities to address cybersecurity incidents, including forensic… more
- Penn Medicine (Philadelphia, PA)
- …**Accountabilities** + **Design and Implementation: Lead the design, implementation, and management of the Identity and Access Management (IAM) ... Architect is responsible for designing, implementing, and managing the Identity and Access ** ** Management (IAM) security architecture for our Epic electronic… more
- Grant Thornton (Philadelphia, PA)
- …technical knowledge and experience while broadening your business and project management skills. Responsibilities include managing and performing cybersecurity ... The professionals in Grant Thornton's Cybersecurity practice help organizations build cybersecurity strategy into their overall business strategy. This includes… more
- ISC2 (Trenton, NJ)
- …for good. As the world's leading nonprofit member organization for cybersecurity professionals, our core values - Integrity, Advocacy, Commitment, Diversity, Equity ... of certifications provide an independent and globally recognized endorsement of cybersecurity knowledge, skills and experience for all career levels. Our charitable… more
- Proofpoint (Philadelphia, PA)
- …focus to the business._ Corporate Overview Proofpoint is a leading cybersecurity company protecting organizations' greatest assets and biggest risks: vulnerabilities ... risk: their people. That's why we're a leader in next-generation cybersecurity . Protection Starts with People. Proofpoint. Data Protection and Compliance Consultant… more
- Highmark Health (Trenton, NJ)
- …adherence to approved methodologies; coordinate resources, time, contingency plans and risk management . + Provide leadership to the department: lead and champion ... Description :** **JOB SUMMARY** This job provides Information Security and Risk Management services for the Organization. Works with peers within security, EnGen… more
- Deloitte (Philadelphia, PA)
- …information security, which may include Data Discovery, Data Classification and Rights Management , Data Access Governance, Data Loss Prevention, Cloud Access ... familiarity with emerging data protection technologies for user communications, eg, Secure Access Service Edge, Data Security Posture Management , Data Security… more
- Cardinal Health (Trenton, NJ)
- …security to the organization. Overall scope includes services/capabilities related to Identity Management , Access Management , Privileged Access Mgt, ... + Demonstrate knowledge and understanding of the key principles of Identity Access Management is required. Experience implementing and supporting IAM and… more
- ISC2 (Trenton, NJ)
- …who provides creative and pragmatic solutions to business issues and problems ** Management Responsibility** + Motivate and lead a diverse, high-performing team ... for good. As the world's leading nonprofit member organization for cybersecurity professionals, our core values - Integrity, Advocacy, Commitment, Diversity, Equity… more
- Deloitte (Philadelphia, PA)
- …information security, which may include Data Discovery, Data Classification and Rights Management , Data Access Governance, Data Loss Prevention, Cloud Access ... familiarity with emerging data protection technologies for user communications, eg, Secure Access Service Edge, Data Security Posture Management , Data Security… more
- Cardinal Health (Trenton, NJ)
- …and Compliance, and Security Architecture teams. We aim to be a world-class cybersecurity and risk management organization that enables Cardinal Health to be ... payers, pharmacists and manufacturers for integrated care coordination and better patient management . Backed by nearly 100 years of experience, with more than 50,000… more
- Lockheed Martin (King Of Prussia, PA)
- …DISA STIGs and resolving security vulnerabilities * Experience with user account management , administration and access controls * Experience with PowerShell or ... the Security Technical Implementation Guide \(STIG\) and the Risk Management Framework \(RMF\)\. If you are looking for a...investigation and may need to meet eligibility requirements for access to classified information\. **What's In It For You**… more
- Deloitte (Horsham, PA)
- Cyber Privileged Access Management CyberArk Manager Are you interested in working in a dynamic environment that offers opportunities for professional growth and ... ends on 5/31/2025 Work you will do: As Privileged Access Management (PAM) CyberArk solutions Manager, you...ensure client satisfaction and expand existing Cyber engagements. + Lead aspects of the proposal development process and Request… more
- Medtronic (Philadelphia, PA)
- …can begin a life-long career of exploration and innovation, while helping champion healthcare access and equity for all. You'll lead with purpose, breaking down ... around the world. Our Touch SurgeryTM Video solution is an innovative video management and data analytics platform for hospitals that includes the DS1 Computer, our… more
- Deloitte (Horsham, PA)
- …services. + Responsible to install, integrate and deploy CyberArk Privileged Access Management (PAM) solutions . + Lead and provide technical guidance to ... Cyber Privileged Access Management CyberArk Senior Consultant Are...of corporate security standards and baselines along with developing cybersecurity policies. + Experience with designing technical architecture, use… more
- Ascensus (Philadelphia, PA)
- …to enhance the overall security posture of the organization. . Identity and Access Management (IAM): Design, implement, and manage IAM solutions to ensure ... with industry best practices and compliance requirements. . Project management : Lead and participate in security-related projects,...appropriate access controls and identity lifecycle management . Evaluate… more
- Vanguard (Chesterbrook, PA)
- …experience in one or more areas (eg, application, cloud, network, vulnerability management , access control, cybersecurity , database administration) + Ability ... technology-related risks and controls across Vanguard. In this role, you will lead and contribute to matrixed teams to complete risk-based audit engagements to… more
- Vanguard (Chesterbrook, PA)
- …cloud, and communications infrastructure; Systems Development Lifecycle (SDLC), change management , application security, data and network security, access ... coordinate dynamic teams leading risk-based audit and consulting engagements to evaluate management 's internal controls and influence senior levels of management … more