- Constellation (Kennett Square, PA)
- …upon the security technologies utilized by the CSOC. Perform system administration on specialized cyber defense applications and systems (eg, EDR, Cloud and ... backup and restoration. Build, install, configure, and test dedicated cyber defense hardware. + Provide Log &...5 to 8 years of solid, diverse experience in cyber security Systems operations, or equivalent combination… more
- Constellation (Kennett Square, PA)
- …benefits package that includes bonus and 401(k). **PRIMARY PURPOSE OF POSITION** The Senior Cyber Security Vulnerability Management Analyst will be expected to ... tests on web-based applications, networks, and other types of computer systems on a regular basis and determines/documents deviations from approved configuration… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Deloitte (Philadelphia, PA)
- …reduce intrusion, and secure information. If you're seeking a career in IAM, cloud systems , or identity governance then Cyber Identity is for you. Qualifications ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...advises, implements, and manages solutions across five verticals: Strategy, Defense and Response; Identity; Infrastructure; Data; and Application Security.… more
- Penn Medicine (Philadelphia, PA)
- …platforms, operating systems and network cybersecurity + Expert knowledge of cyber defense tools, including VM, SIEM, SOAR, EDR, UEBA, NDR, SWG, ... Are you living your life's work? **Summary:** + The Vulnerability Management Senior Analyst functions as a technical expert that provides support to vulnerability… more
- Penn Medicine (Philadelphia, PA)
- …platforms, operating systems and network cybersecurity + Expert knowledge of cyber defense tools, including SIEM, SOAR, EDR, UEBA, NDR, SWG, SEG, ... research and analysis of threat and vulnerabilities affecting information systems , and participating in other cybersecurity program activities, including risk… more
- Lockheed Martin (King Of Prussia, PA)
- …experience within the DoD or Intelligence Community\. * Knowledge of the Defense Information Systems Agency \(DISA\) Security Technical Implementation Guides ... **Description:** At Lockheed Martin Rotary and Mission Systems \(RMS\), we are driven by innovation and...to interface with numerous cognizant security agencies, customers, and senior managers\. * Knowledge of other security disciplines and… more
- Citigroup (Wilmington, DE)
- …Payments Product within Treasury and Trade Solutions (TTS). The Operational Risk Senior Officer I will provide hands-on support to TTS Business Units, In-Business ... risks are identified, managed, and monitored effectively. The Operational Risk Senior Officer I is accountable for management of complex/critical/large professional… more
- City National Bank (Wilmington, DE)
- …Business Continuity Risk Management (BCRM) program is in the second line of defense and is accountable for CNB's BCRM strategy and framework, enabling CNB to ... associated with business continuity arising from CNB's business processes, people, systems or external events. BCRM works across CNB's businesses and functions,… more
- Citigroup (Wilmington, DE)
- …communication skills required in order to negotiate internally, often at a senior level. Developed communication and diplomacy skills are required in order to ... oversight may include (not limited to) technology operational risk, cyber risk for example. + Serves as an SME...maintains relationships across the business users and Lines of Defense to better understand and deliver customer requirements by… more