- Grant Thornton (Boston, MA)
- …strategy. This includes supporting our clients to identify and understand their cyber risk exposure, design and implement cybersecurity programs and solutions ... to mitigate cyber threats and...services across a broad spectrum of areas, including threat protection , data protection , security engineering,… more
- Deloitte (Boston, MA)
- …and/or Oracle Identity Cloud Service (IDCS) + Knowledge/experience in data protection tools and techniques + Oracle Risk Management Cloud Certified ... a timely manner, pervasive issues, such as identity theft, data security breaches, data leakage, cyber...to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing… more
- Deloitte (Boston, MA)
- …and technology skills to help clients transform their legacy programs into proactive cyber risk programs. Join the team developing the future state of ... cyber risk solutions. Learn more about Deloitte...Sign-on (SSO) and Multi-factored authentication (MFA) + Knowledge/experience in data protection tools and techniques + Knowledge/experience… more
- UKG (Ultimate Kronos Group) (Lowell, MA)
- …inspired by you. Job Summary As a Lead Insider Threat Analyst within UKG's Cyber Defense Fusion Center, you will support the ongoing development and execution of our ... identify, analyze, and mitigate risks posed by insider threats, ensuring the protection of our critical assets and sensitive information. You will collaborate with… more
- MIT Lincoln Laboratory (Lexington, MA)
- Position Description The Cyber Security Vulnerability Management Team Lead will provide leadership and direction in the day-to-day management of the vulnerability ... assessment, tracking, and remediation efforts to the Laboratory Cyber Security Vulnerability Management Infrastructure. The Cyber Security VM Team Lead will… more
- The MITRE Corporation (Bedford, MA)
- …compliance policies/procedures and implementation. + Lead the strategy on responding to Cyber Operational Readiness Assessments, etc., improve risk ratings, and ... Services is looking to fill a Lead Information Systems Cyber Engineer position, with a focus on unclassified environments...Unclassified Information (CUI). + Utilize security tools to enhance protection of information systems and data . +… more
- Grant Thornton (Boston, MA)
- Grant Thornton is seeking a Cyber Privacy and Data Protection...From day one, you'll be empowered by the greater Risk team and Cyber team to help ... CA and San Jose, CA. Grant Thornton's Privacy and Data Protection team helps our clients transform...a variety of domains including privacy strategy, governance, automation, risk , and compliance management - all with the resources,… more
- Citizens (Westwood, MA)
- …by performing control assessments on third parties, in relation to data protection , cyber security, and operational risk . These assessments are completed ... The goal of the TPA team is to provide Cyber and Business Continuity requirements, but most importantly, provide...parties, while providing robust and challenging insight on business risk and on the adequacy and effectiveness of the… more
- Deloitte (Boston, MA)
- …secure and support technology innovation required by the business. Join Deloitte's Advisory Cloud Cyber Risk Services team and become a member of the largest ... group of Cyber Risk individuals worldwide. Microsoft is an...control, auditing and monitoring, security incident and event management, data protection (classification/labeling, DLP, encryption), user and… more
- Trellix (Boston, MA)
- …cyber threat intelligence capabilities by leveraging the experience, knowledge, tools, and data of the Trellix cyber defense enterprise. The role is ... organizations confronted by today's most advanced threats gain confidence in the protection and resilience of their operations. Trellix, along with an extensive… more
- Sumaria Systems, Inc. (Bedford, MA)
- …Description: + Assist with development of System Security Management Plans, Program Protection Plans, Security Risk Analyses, OPSEC Plans, Computer Certification ... and defend against unauthorized access to systems, networks, and data + Conduct risk and vulnerability assessments...of planned and installed information systems to identify vulnerabilities, risk , and protection needs + Promote awareness… more
- Robert Half (Boston, MA)
- …Knowledge of security-related topics such as authentication, entitlements, identity management, data protection , data leakage prevention, validation ... take necessary corrective steps in real-life situations. Additionally, this team offers data privacy and protection services to safeguard personal information,… more
- Eversource Energy (Westwood, MA)
- …clear point of escalation and subject matter expert for Application Security and associated IT Risk \. Serve as a cyber risk advisor to the leadership team ... multiple security domains \(e\.g\., mobile, application security, vulnerability reduction, data protection , encryption, logging and monitoring, network security,… more
- General Dynamics Information Technology (Bedford, MA)
- …security implementation policy and guidelines of network security, based upon the Risk Management Framework (RMF) with emphasize on Joint. + Special Access Program ... Implementation Guide (JSIG) authorization process. + Advise customer on Risk Management Framework (RMF) assessment and authorization issues. + Perform risk … more
- Proofpoint (Boston, MA)
- …passion and customer focus to the business._ **Corporate Overview** In today's cyber threat landscape, protection starts with people. At Proofpoint, that ... simple truth fuels our passion for protecting users, the data they create, and the systems they rely on...our customers protect their greatest assets and biggest security risk : their people. That is why we are a… more
- Boston Mutual Life Insurance (Canton, MA)
- …to cybersecurity and privacy + Monitoring and reporting on compliance with security and data protection policies, as well as the + enforcement of policies. + ... making it easy to secure a level of financial protection with a portfolio of products - beginning with...identify, monitor, evaluate, and manage Boston Mutual's Technology and Cyber risks - including operational losses, material risk… more
- CVS Health (Boston, MA)
- …Python, JavaScript, Shell Script, PowerShell. . Strong experience with implementing and managing data protection measures and compliance with data ... excellence, and innovation. . Strong technical expertise with Application, Cloud, Data , and Network Security best practices. . Strong technical expertise with… more
- CVS Health (Boston, MA)
- …Python, JavaScript, Shell Script, PowerShell. . Strong experience with implementing and managing data protection measures and compliance with data ... excellence, and innovation. . Strong technical expertise with Application, Cloud, Data , and Network Security best practices. . Strong technical expertise with… more
- CVS Health (Boston, MA)
- …Python, JavaScript, Shell Script, PowerShell. . Strong experience with implementing and managing data protection measures and compliance with data ... excellence within the team. . Strong technical expertise with Application, Cloud, Data , and Network Security best practices. . Strong technical expertise with… more
- J&J Family of Companies (Danvers, MA)
- …security solutions for implantable, wearable, and external cardiac assist devices, ensuring protection from cyber threats across embedded, edge, cloud, and ... product cybersecurity expert, you will influence secure design, architecture, and risk mitigation approaches, engaging with R&D, Cloud Engineering, AI/ML teams,… more