- Penn Medicine (Philadelphia, PA)
- …of remote work after the introductory period is complete_ . Summary: + The IAM Access Management Lead will oversee the modernization and ongoing ... hospital systems while enhancing user experience and maintaining stringent security standards. The Access Management Lead will work closely with IT… more
- Penn Medicine (Philadelphia, PA)
- …Civic Center Blvd. Philadelphia, PA** **Hours- M-F, Hybrid** **Summary:** + The Cybersecurity Identity Management Sr. Engineer reports to the Cybersecurity ... cybersecurity . (Required) + 2+ years of IAM cybersecurity experience. (Required) + 1+ years management /leadership...IAM solutions, including IGA, RBAC, AD, key and certificate management , access design and provisioning + Ability… more
- ManTech (Philadelphia, PA)
- …and update of incident response plans for Navy Operational Technology (OT) systems. + Lead a team of ISSMs/ISSEs to provide cybersecurity evaluations and risk ... in OT systems for hardening, patching, or other corrective actions. + Lead the remediation activities to address cybersecurity incidents, including forensic… more
- Penn Medicine (Philadelphia, PA)
- …**Accountabilities** + **Design and Implementation: Lead the design, implementation, and management of the Identity and Access Management (IAM) ... Architect is responsible for designing, implementing, and managing the Identity and Access ** ** Management (IAM) security architecture for our Epic electronic… more
- M&T Bank (Wilmington, DE)
- …static application security testing/dynamic application security testing (SAST/DAST)** **Identity and Access Management - regulate and secure user access ... access . Functions/teams may include service & delivery, privileged access management , infrastructure & tooling, governance & oversight, monitoring… more
- Grant Thornton (Philadelphia, PA)
- …technical knowledge and experience while broadening your business and project management skills. Responsibilities include managing and performing cybersecurity ... The professionals in Grant Thornton's Cybersecurity practice help organizations build cybersecurity strategy into their overall business strategy. This includes… more
- Proofpoint (Philadelphia, PA)
- …and biggest security risk: their people. That's why we're a leader in next-generation cybersecurity -and why more than half of the Fortune 100 trust us as a security ... of the customer, provide that structured feedback to product management . + Identify At Risk customers that are not...are not achieving their desired outcome and as needed, lead cross-functional efforts to get those customers back on… more
- Proofpoint (Philadelphia, PA)
- …focus to the business._ Corporate Overview Proofpoint is a leading cybersecurity company protecting organizations' greatest assets and biggest risks: vulnerabilities ... risk: their people. That's why we're a leader in next-generation cybersecurity . Protection Starts with People. Proofpoint. Data Protection and Compliance Consultant… more
- Deloitte (Philadelphia, PA)
- …information security, which may include Data Discovery, Data Classification and Rights Management , Data Access Governance, Data Loss Prevention, Cloud Access ... familiarity with emerging data protection technologies for user communications, eg, Secure Access Service Edge, Data Security Posture Management , Data Security… more
- Deloitte (Philadelphia, PA)
- …information security, which may include Data Discovery, Data Classification and Rights Management , Data Access Governance, Data Loss Prevention, Cloud Access ... familiarity with emerging data protection technologies for user communications, eg, Secure Access Service Edge, Data Security Posture Management , Data Security… more
- Lockheed Martin (King Of Prussia, PA)
- …DISA STIGs and resolving security vulnerabilities * Experience with user account management , administration and access controls * Experience with PowerShell or ... the Security Technical Implementation Guide \(STIG\) and the Risk Management Framework \(RMF\)\. If you are looking for a...investigation and may need to meet eligibility requirements for access to classified information\. **What's In It For You**… more
- Deloitte (Philadelphia, PA)
- Cyber Privileged Access Management CyberArk Manager Are you interested in working in a dynamic environment that offers opportunities for professional growth and ... ends on 5/31/2025 Work you will do: As Privileged Access Management (PAM) CyberArk solutions Manager, you...ensure client satisfaction and expand existing Cyber engagements. + Lead aspects of the proposal development process and Request… more
- Medtronic (Philadelphia, PA)
- …can begin a life-long career of exploration and innovation, while helping champion healthcare access and equity for all. You'll lead with purpose, breaking down ... around the world. Our Touch SurgeryTM Video solution is an innovative video management and data analytics platform for hospitals that includes the DS1 Computer, our… more
- Deloitte (Philadelphia, PA)
- …services. + Responsible to install, integrate and deploy CyberArk Privileged Access Management (PAM) solutions . + Lead and provide technical guidance to ... Cyber Privileged Access Management CyberArk Senior Consultant Are...of corporate security standards and baselines along with developing cybersecurity policies. + Experience with designing technical architecture, use… more
- Ascensus (Philadelphia, PA)
- …to enhance the overall security posture of the organization. . Identity and Access Management (IAM): Design, implement, and manage IAM solutions to ensure ... with industry best practices and compliance requirements. . Project management : Lead and participate in security-related projects,...appropriate access controls and identity lifecycle management . Evaluate… more
- M&T Bank (Wilmington, DE)
- As a member of the Customer Identity and Access Management (CIAM) team, you will be a critical part of our customer's first experience when they wish to transact ... customers and security landscape. **FUNCTION:** Supports the Customer Identity and Access Management (CIAM) team's portfolio through architecting and designing… more
- Hologic (Newark, DE)
- …to medical devices. + Strong knowledge in medical device Design Controls, Risk Management and Cybersecurity requirements. + Previous experience in advocacy and ... Newark, DE, United States United States As the Regulatory Affairs Director, you will lead the AI and Connected Health franchise for Regulatory and be a member of… more
- Vanguard (Chesterbrook, PA)
- …cloud, and communications infrastructure; Systems Development Lifecycle (SDLC), change management , application security, data and network security, access ... coordinate dynamic teams leading risk-based audit and consulting engagements to evaluate management 's internal controls and influence senior levels of management … more
- Vanguard (Chesterbrook, PA)
- …experience in one or more areas (eg, application, cloud, network, vulnerability management , access control, cybersecurity , database administration) + Ability ... technology-related risks and controls across Vanguard. In this role, you will lead and contribute to matrixed teams to complete risk-based audit engagements to… more
- Grant Thornton (Philadelphia, PA)
- …variety of domains including privacy strategy, governance, automation, risk, and compliance management - all with the resources, environment, and support to help you ... and data protection trends to issues and other opportunities for improvement + Lead the execution of assigned client engagements from start to finish, which includes… more