- Insmed Incorporated (NJ)
- …technical proficiency across cybersecurity frameworks, cloud security, and identity management .Skilled in budget planning, vendor management , ... in everything we do. We are seeking an experienced leader to oversee cybersecurity operations, enterprise risk management , and Computer Systems Validation (CSV)… more
- Bank of America (Boston, MA)
- …center that monitors, detects, and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that ... Identity and Access Management ...automation solutions, such as connector frameworks. Collaborate with partner cybersecurity , engineering, and compliance teams to develop and align… more
- Bank of America (Boston, MA)
- …center that monitors, detects and responds to cybersecurity incidents. Within GIS, Identity and Access Management (IAM) is a security discipline that ... and heterogenous technology environment. Deep experience with Linux, Windows, Cloud scale Identity , Access Management (Single Sign-On, Multi Factor… more
- GE Aerospace (Lynn, MA)
- …in commercial as well as military applications. As a Principal Embedded Cybersecurity Engineer, you will architect and develop next generation embedded platforms and ... GE Aerospace programs. Job Description Essential Responsibilities: As a Principal Embedded Cybersecurity Engineer, you will: Work independently as well as with a… more
- GovCIO (Oklahoma City, OK)
- Overview GovCIO is currently hiring for Cybersecurity Incident Respose Administrator to be responsible forSecurity Information and Event Management (SIEM) ... VA and will be a remote position. Responsibilities The Senior Cybersecurity Incident Response Administrator (Information Assurance Engineer - Senior) will be… more
- JPMorgan Chase (Columbus, OH)
- We are on the lookout for a talented Senior Associate to join our Cybersecurity and Technology Controls Internal Audit team with a focus on Technology Governance, ... As a Technology Senior Internal Audit Associate within the Cybersecurity and Technology Controls Team, you will execute the...and report them in a timely manner to Audit management and business stakeholders Partner with stakeholders, business … more
- Applied Research Solutions (Bedford, MA)
- Description ARS is seeking candidates to fill a Systems Cybersecurity Journeyman role located on Hanscom AFB in Bedford, Massachusetts. The selected individual will ... artifacts mandated by governing DoD and Air Force policies (ie, Risk Management Framework (RMF). Recommending policies and procedures to ensure the reliability of… more
- MUFG (Tempe, AZ)
- …experience a plus. High technical knowledge across Cybersecurity domains such as Identity Access Management , Data Security, Configuration Management , ... provide control design guidance and conduct independent control assessments within the Cybersecurity GRC function. The primary focus will be on the design,… more
- Bank of America (Boston, MA)
- …by identifying and remediating stale permissions. 5+ years in cybersecurity or identity management focused on privileged access or Active Directory ... Privileged Access Management (PAM) Specialist (Active Directory...This is a fantastic opportunity to work on cutting-edge cybersecurity initiatives focused on Active Directory , Microsoft Entra… more
- Huntington National Bank (Columbus, OH)
- … (SIEM) systems, intrusion detection/prevention systems (IDS/IPS), public key infrastructure (PKI), identity and access management (IDAM) systems, antivirus ... Cyber Security background (1-3 years experience) Understanding of vulnerability management lifecycle and process. Ability to communicate effectively clearly and… more
- Cardinal Health (Salem, OR)
- …intrusion detection and completes risk assessments. The Director, Information Security and Risk ( Identity & Access Management ) is responsible for leading the ... organization's Identity & Access Management (IAM) strategy, governance, and operations to ensure secure, efficient, and compliant access to technology… more
- GE Vernova (Imperial, PA)
- …similar framework (eg, NIST 800-171, ISO 27001). Strong understanding of cybersecurity principles, risk management , and compliance frameworks. Excellent ... is US citizenship. Knowledge of security technologies, such as CCTV systems, access control systems, and cybersecurity tools. Desired Characteristics Deep… more
- SHI (Raleigh, NC)
- …clients implement specific product solutions, gain insight and context to their complex Identity and Access Management (IAM) environments and provide ... About Us As a digital and cybersecurity services company, Stratascale exists to help the...stratascale.com. Job Description Summary The Sr. Security Consultant - Identity Management will serve as a subject… more
- Accenture (Charlotte, NC)
- …transformation programs focused on secure OT/IT convergence, threat detection modernization, and identity and access management (IAM) for critical ... leader in delivering end-to-end cybersecurity services across strategy, risk management , digital identity , cyber defense, and managed security. With security… more
- Truist (Raleigh, NC)
- … risks. Lead efforts related to designing, planning, enhancing, and testing identity management technologies used in the SAP landscape including base-lining ... the following job description: Responsible for developing and supporting SAP GRC Access Control processes across the SAP software stack. This role ensures compliance… more
- Accenture (Detroit, MI)
- …and in depth understanding and experience in at least one of the cybersecurity domains (eg threat intelligence, threat exposure management , data protection, ... millions of lives every day. We turn ideas into reality. Accenture Cybersecurity helps organizations prepare, protect, detect, respond and recover along all points… more
- The MITRE Corporation (Bedford, MA)
- …Supply Chain Cyber Threat Intelligence Defensive Cyber Operations Enterprise Security Architecture Identity , Credentialing, and Access Management Internet of ... Curated training opportunities to develop new skills or enhance existing skills Access to mentors who are world-class cybersecurity experts Vibrant cohort… more
- EY (Detroit, MI)
- …HR systems, and cloud platforms. Implement identity lifecycle management process (provisioning, de-provisioning, access reviews). Collaborate with client ... experience with Saviynt or Microsoft Entra configuration and implementation. Understanding of identity lifecycle management and access governance. Knowledge… more
- Trellix (Boston, MA)
- …Trellix, the trusted CISO ally, is redefining the future of cybersecurity and soulful work. Our comprehensive, GenAI-powered platform helps organizations confronted ... architected security solutions. We also recognize the importance of closing the 4-million-person cybersecurity talent gap. We aim to create a home for anyone seeking… more
- Ascension Health (St. Louis, MO)
- … Cybersecurity , or a related field (Master's preferred). 10+ years of progressive experience in Identity & Access Management , with at least 5 years in a ... (eg: Clear) solutions for third-party user lifecycle management , access certifications, policy enforcement, and reporting. Establish identity policies… more