This position will perform assessments of systems and networks within the networking environment or enclave and identify where those systems and networks deviate from acceptable configurations, enclave policy, or local policy.
In this role, you will assist in developing and maturing the future services and capabilities of the SOC, such as Forensics, Threat Management, Penetration Assessments, Tool Management, and more. The selected candidate will ensure that all procedures and operations are carried out by the responsible parties.
In this role, the selected candidate must have the ability to compare and evaluate Yes courses of conduct and recommend a decision to project management after various possibilities have been considered.
The Information Security Engineer - Application Security role is an individual contributor role to support a global program to actively identify and exploit vulnerabilities across Equifax applications utilizing dynamic, manual, and static methodologies.
In this role, you will create, update and maintain various checklists, spreadsheets, databases, and dashboard and custom tool-sets to analyze compliance posture. The selected candidate will utilize and review network scans, tools and log files to report on system compliance, risk and threat levels.
This position, offers the opportunity to work with and learn from other information systems security professionals, industrial security counterparts, program and government security representatives, systems and network engineers and various other program personnel that all work together to ensure compliance with government and corporate information systems security policies, procedures and requirements.
In this role, the selected candidate will develop, deploys and/or maintains enterprise-wide computing and information security requirements, policies, standards, guidelines and procedures for a stakeholder organization or program/sub program.
In this role, the selected candidate will lead new and recurring 3rd party security risk assessments, develop mitigation plans, and work with internal stakeholders to assign remediation tracking responsibility.
The Information Systems (IS) Analyst is responsible researching, planning, coordinating, designing and implementing business, cost, strategy, software and system choices to meet the organization's business requirements.
This candidate would be responsible for providing deployment and support of Oracle Identity Gateway (OIG, OIM) for the primary purpose of provisioning and deprovisioning accounts within Microsoft Active Directory.
In this role, you will provide full-spectrum systems engineering, integration, manufacturing, and life cycle. The selected candidate will develop and maintain Cyber Security Assessment and Authorization processes to evaluate compliance.