Guide Service Delivery and Testing Team staff on system architectures, project detail and timelines; analyze problems and provide technical investigation of support queries escalated by the global support team to engineering team.
The Service Asset Configuration Analyst focuses on the overall quality of the Configuration Management Database (CMDB) by ensuring configuration items and relationships are accurate and complete by policing process adherence and data quality against documented standards.
As an Information Security Risk Management Analyst you will be performing, Information Security Risk Management duties; perform duties to support the effort in providing Information Risk management and assessments for IT and business units.
This IT Security Analyst (Awareness and Training) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know,understand and follow our security requirements and behave in a secure manner.
Responsible for creating desired functionality to assigned content, products or services in ecommerce. Develops, tests and implements software that provides robust technical infrastructure and/or software applications used by business units.
Performing current state risk assessments, continual risk assessments, risk metrics and visualization, risk convergence, IT risk and control framework design, and integrated operational risk management.
In this role, the selected candidate will maintain the network security system infrastructure uptime, manage device policies, troubleshoot configuration issues and maintain integration with centralized log management and Security Incident and Event Management (SIEM) related infrastructure.
This IT Security Analyst (Awareness and Trainng) is overall responsible for our security awareness and training program. Ultimately this person's job is to reduce risk to our organization by ensuring all employees, staff and contractors know, understand and follow our security requirements and behave in a secure manner.
This individual will participate in a team of network security professionals in a 24x7 Enterprise IT Security Operations organization. He/She will be part of the enterprise infrastructure of the Network Security team, such as implementation of firewall rules and VPN administration.