- Deloitte (Pittsburgh, PA)
- …production and maintenance, and retirement. If you're seeking a career in vulnerability management , quality assurance, or GRC tools, then Application Security ... Are you looking to elevate your cyber career? Your technical skills? Your opportunity for...existing S4/HANA & GRC Access Controls instance and the project landscape + Develop strategies to assess whether applications… more
- Duquesne Light Company (Pittsburgh, PA)
- …premise security products including Configuration Monitoring platforms, SIEM Solutions, Vulnerability Management platforms, and Endpoint Detection and Response ... Role Include:** + Intermediate understanding of cybersecurity topics such as vulnerability management , incident response, endpoint protection and email security.… more
- Huntington National Bank (Pittsburgh, PA)
- …+ Cyber Security Fundamentals (Familiarity with key concepts of Vulnerability Management , Network Security/Secure Transmission Management , Data Loss ... KPI/KRI metrics. + Document activities in accordance with Agile Project Management methodology (Backlog activity, Change Mgmt,...including 24x7 support. + Works closely with the other cyber and IT/TIPS teams, and various lines of business… more
- Black & Veatch (Canonsburg, PA)
- …implementation of the strategic direction and objectives of a service offering ** Project Management Capability (where applicable):** + Manages moderate to highly ... + Secures receivables from clients during and after completion of engagements ** Management Responsibilities** Individual Contributor Acts as a project manager.… more
- KPMG (Pittsburgh, PA)
- …future as we are, join our team. KPMG is currently seeking a Cyber Operations Content Development & Engineering to join our Enterprise Security Services ... a remote work opportunity. Responsibilities: + Apply a thorough understanding of cyber security operations and monitoring to manage and perform the day-to-day… more
- Katmai (Brilliant, OH)
- …required). **DESIRED QUALIFICATIONS & SKILLS** + Knowledge of network security, vulnerability assessment, and risk management . + Familiarity with database ... consultative services and is responsible for supporting the development and management of IT cybersecurity, including disaster recovery, database protection, and… more