- Grant Thornton (Philadelphia, PA)
- …contribute to our clients' business needs across a variety of domains including privacy strategy, governance, automation, risk , and compliance management - all ... From day one, you'll be empowered by the greater Risk team and Cyber team to help clients make...all levels in the development and marketing of the privacy and data protection solution offering + Lead… more
- Deloitte (Philadelphia, PA)
- …to safeguard our senior leaders and organizational assets. You will also conduct risk assessments, coordinate with security agencies, and lead crisis management ... strategic thinker with a robust background in executive protection, risk assessment, and crisis management techniques. You will be...briefings and reports to senior management + Ensure the confidentiality and privacy of senior leaders at… more
- TD Bank (Philadelphia, PA)
- …exercises discretion in managing correspondence, information and all matters of confidentiality and privacy ; escalates issues where appropriate + Ensures ... as a source of advice to senior management in field of specialty; may lead team(s) of related specialists/experts + Undertakes and completes a variety of complex… more
- Deloitte (Philadelphia, PA)
- …and adherence to the organization's records and contracts management and confidentiality , privacy , and information security policies. Responsibilities include: + ... resulting in improved records and contracts related outcomes, further risk mitigation and desired people-related outcomes, while maintaining and promoting… more
- Jensen Hughes Inc. (Philadelphia, PA)
- …since 1939. Today, our expertise extends broadly across closely related security and risk -based fields - from accessibility consulting and risk analysis to ... objectives * Assist in the annual audit process * Lead the planning, documentation, and execution of internal process...Hughes is committed to compliance with all relevant data privacy laws in all areas where we do business,… more
- RELX INC (Philadelphia, PA)
- …protection and mitigation technologies and processes which ensure the confidentiality , integrity, and availability of the organization's assets, information, data, ... cyber forensic investigations on physical endpoints and cloud platforms, independently lead the full life-cycle of incident response investigations of all reported… more