In this role, you will be responsible to perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intentional or inadvertent access or destruction.
In this role, the selected candidate will be responsible for the oversight of all layers of data security. They develop processes and ensure compliance with all applicable security standards such as HIPAA, PCI, PHI, PII and monitor the organization in its adherence to the policies. This position is located in Sacramento, California.
In this role, you will be responsible to develop and implement policies procedures, processes, programs, and practices to guide the bank toward mature IT governance consistent with industry laws and regulations. Central to the technology's organization's success in effectively managing IT risk and meeting regulatory expectations.
The ideal candidate thrives on being in the critical path supporting multi million dollar IT investments, leverages experience and technical knowledge, builds and improves processes, tools and automation, applies legal and contract negotiation skills to bring desired results.
The Security Metrics and Reporting Analyst will be responsible for delivering and supporting information security business intelligence reports and dashboards, in partnership with internal business stake-holders, and security and engineering teams.
In this role, the selected candidate will establish collaborative working relationships with the businesses, functions and regions to ensure that IT solutions align with security architecture and business strategy.
The Regional IT Systems Analyst is responsible in providing the information requirements and systems needs of the North America my REMIT business; he will provide the day to day systems applications support ensuring that it is running smoothly.
In this role, you will be responsible for developing proposed system design and interface specifications based on identified business needs using structured analytical techniques, employing technical and specific business knowledge.
In this role, the selected candidate must have experience on threat management platforms & vulnerability management platforms, experience with open sources and commercial threat intelligence sources and platforms.
In this role, the selected candidate develops technical security standards, requirements and implementation of appropriate technology architectures to mitigate information security risks to the enterprise.
In this role, you will develop plans and implement systems and procedures to effectively secure company information, virtual infrastructure, intellectual property, and users against accidental or unauthorized modification, destruction or disclosure.
In this role, the selected candidate will analyze a variety of network and host-based security appliance logs (Firewalls, NIDS, HIDS, Sys Logs, etc.) to determine the correct remediation actions and escalation paths for each incident.