- Deloitte (Morristown, NJ)
- …and/or Oracle Identity Cloud Service (IDCS) + Knowledge/experience in data protection tools and techniques + Oracle Risk Management Cloud Certified ... a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber...to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing… more
- Deloitte (Morristown, NJ)
- …and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of ... cyber risk solutions. Learn more about Deloitte...Sign-on (SSO) and Multi-factored authentication (MFA) + Knowledge/experience in data protection tools and techniques + Knowledge/experience… more
- Highmark Health (Trenton, NJ)
- …provides information security and risk management services with a focus on data protection . The position leads a team of application and infrastructure ... CSF), or the NIST 800-83 cyber security framework + Experience with data protection technologies like Purview DLP, Symantec, Forcepoint, BigID, Varonis, IBM… more
- RELX INC (Trenton, NJ)
- …users make breakthroughs and drive societal progress. Are you looking for a unique Cyber Security role whereby you will provide key insight and research into new ... Responsibilities: + Helping improve the resilience and readiness of security protection and mitigation technologies and processes which ensure the confidentiality,… more
- Deloitte (Princeton, NJ)
- …secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest ... group of Cyber Risk individuals worldwide. Microsoft is an...control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and… more
- AbbVie (Florham Park, NJ)
- …matters across business areas and jurisdictions, with a primary focus on US data privacy and cyber security matters. Core Job Responsibilities: + Strategic ... reviews, and negotiations. + Draft, review, negotiate, and manage data privacy and protection terms for a...and emerging technologies. + Legal support for information security risk management team, including data breach analysis… more
- ManpowerGroup (Berkeley Heights, NJ)
- …for Endpoint, Microsoft Defender for Office 365, Microsoft Defender for Identity - Data Protection : Microsoft Purview, Microsoft Information Protection , DLP, ... programs based on business priorities and risks to address Cyber -Security, Cyber Defense and Business needs of...environment with Azure, in a technical information security and risk management role. *5+ years managing security policies and… more
- Old Dominion Freight Line (Bethlehem, PA)
- …security, cloud architecture, endpoint security, identity and access management, and data protection , while ensuring compliance with regulatory requirements and ... integrity, confidentiality, and availability of the organization's information systems and data . You will lead the development of cybersecurity strategies, provide… more
- Citizens (Iselin, NJ)
- …domains including but not limited to: Identity and access, vulnerability management, data protection , infrastructure security, cloud and SaaS security, code ... backlog maintenance, prioritization, and planning. You will utilize metrics and data visualization to report progress, support decision making, and creating… more
- Lumen (Trenton, NJ)
- …supporting a Federal agency and other specialized customers in support of National Cyber Protection System (NCPS) initiatives. This role will work seamlessly ... connects the world. We are igniting business growth by connecting people, data and applications - quickly, securely, and effortlessly. Together, we are building… more
- Robert Half Technology (Bensalem, PA)
- …network perimeter security technologies, including firewalls, web filter, intrusion detection/ protection systems, data loss prevention, vulnerability scanners, ... and endpoint technologies * Display a strong understanding of Security Risk Assessment Methodology, Vulnerability Analysis, and SIEM technology * Demonstrate… more