The successful candidate must be able to handle multiple simultaneous tasks in a high tempo work environment, have strong written and verbal communication skills, be capable of working in a team environment, and have enthusiasm for solving a cutting edge problem with limited past technical solutions as reference.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
In this role, the selected candidate will analyze security event audit log information from network security devices (e.g., network and host-based security systems, firewalls, routers, switches, etc.) and mission critical servers for anomalies and known attack patterns.
The Information Systems (IS) Analyst is responsible researching, planning, coordinating, designing and implementing business, cost, strategy, software and system choices to meet the organization's business requirements.
In this role, the selected candidate must have the ability to compare and evaluate Yes courses of conduct and recommend a decision to project management after various possibilities have been considered.
In this role, you will provide guidance or countermeasures to defend against the threat. The selected candidate will respond to cyber-security incidents by reporting all pertinent information on local incident.
In this role, the selected candidate will collaborate with SCRUM/project team members and End-Users to understand the key processes and technologies within the Applications for the supported business functions.
This candidate would be responsible for providing deployment and support of Oracle Identity Gateway (OIG, OIM) for the primary purpose of provisioning and deprovisioning accounts within Microsoft Active Directory.