- Southern Company (Atlanta, GA)
- **SCS Technology Security** **IT Security Analyst , Special/Senior** ** Threat and Vulnerability Analyst ** **Job Description** At Southern Company, our ... Southern Company is seeking a passionate and experienced Team Lead for our Vulnerability Management Program. This is a technical, hands-on role that requires the… more
- Regions Bank (Atlanta, GA)
- …network intrusion detection, network traffic and packet analysis, penetration testing, vulnerability scanning, compliance, audit, or cyber threat intelligence + ... of the system. **Job Description:** At Regions, the Cyber Security Analyst is responsible for analyzing, identifying, and documenting cybersecurity risks. This… more
- Regions Bank (Atlanta, GA)
- …network intrusion detection, network traffic and packet analysis, penetration testing, vulnerability scanning, compliance, audit, or cyber threat intelligence. + ... of the system. **Job Description:** At Regions, the Cyber Security Analyst is responsible for analyzing, identifying, and documenting cybersecurity risks. This… more
- DRT Strategies, Inc. (Atlanta, GA)
- …recommendation efforts across the country. Job Summary: The Information Security Analyst will be responsible for safeguarding the confidentiality, integrity, and ... detect and respond to potential security threats. + Perform routine vulnerability assessments and risk assessments across systems, networks, and applications.… more
- Morgan Stanley (Alpharetta, GA)
- …critical risks and high risks. Collect and analyze information pertaining to the threat landscape and any business disrupting events that may impact the Firm's ... the position offered or Three (3) years as Principal Software Engineer; Security Analyst ; or related occupation in the technology field. The employer will accept a… more
- Truist (Atlanta, GA)
- …determining scope, urgency, and potential impact, identifying the specific vulnerability , and making recommendations that enable expeditious remediation. 4. Perform ... incident handling (eg, forensic collections, intrusion correlation and tracking, threat analysis, containment, eradication, and direct system remediation) tasks. 5.… more