In this role, the selected candidate will lead and mature enterprise vulnerability scanning solutions for a large IT enterprise; educate and mentor cross-functional individuals on identified vulnerabilities and remediation strategies.
In this role, the selected candidate must have the ability/experience analyzing enterprise business operations and technology issues across areas within a large organization; advanced ability/experience recognizing how and when to improve a process and recommending, negotiating, and implementing change.
This position is a newly created role to assist the Director of IT and Information Security with various initiatives. You will be joining a small team that is responsible for reviewing, analyzing and implementing security controls, vulnerability management, security metrics and end-user awareness for the entire organization.
In this role, the selected candidate will perform assigned tasks with minimum supervision and manages efforts based on proper triage prioritization, documentation and closure; take corrective action and/or escalates incidences to reduce business interruptions.
This position will provide services directly to the business unit as well as oversee the Minimum Acceptable Risk Standards for Exchanges (MARS-E) 2.0 on behalf of the Chief Information Security Officer (CISO).
In this role, the selected candidate will be responsible for designing and evaluating the processes and controls, accountable for consulting and advising on large, complex and ambiguous efforts on the appropriate information protection controls.
The Information Security Audit Team Lead will be responsible for performing various technical security audits, educating the business on the inherent risks, and proposing meaningful mitigation strategies.
The Supply Base Analyst will be responsible for contract execution including (but not limited to) complex professional service agreements, pricing negotiations, licensing, Xaas, statement of work development, data security, risk mitigation, service level agreements, key performance indicators and minimum insurance requirements for software, hardware, telecom and service delivery categories.
In this role, you will provide leadership, oversight, guidance and training for Information System Security Officers ( ISSOs) and system administrators ( SAs ) and insure compliance of all customer IS security requirements.