In this role, the selected candidate must have the ability to assist team members & Vendors with proper artifact collection and detail to clients examples of artifacts that will satisfy assessment requirements.
Communicate gathered video intelligence to leaders within the organization and to specifically identified stakeholders and assist other Rock Ventures Analysts with ongoing investigations and incidents pertaining to the Family of Companies and areas surrounding them .
The Business Analyst will perform a wide variety of functions to support program management in preparing reports & analyses, identifying improvement opportunities, ensuring quality processes and responding to customer or internal inquiries.
In this role, the resource will lead and also participate in security audits to measure and quantify exposures within our business systems, processes, infrastructure, and third party service providers.
Support daily operations for the ZF User Management (ZUM) group across Region North America; this group supports the ZF User Management and Information Protection guidelines and principles through management of user accounts, as well as access and authorization rights.
The Information Security Analyst II will support the college information security program to ensure secured electronic systems architecture and functionality and safeguarding all confidential, proprietary, privileged and protected information assets.
The selected Consultant will work closely with the designated Clients OISP CISO and their staff, Clients ITO Chiefs and supervisors, and the OIT security group to address Clients IT security and to ensure all Clients IT related security issues are addressed.
Facilitate awareness communications to various audiences, coordinate, and maintain project schedules, plans, and scope using standard project management methodologies. Assist with documenting security policies, standards, and guidelines based on the organization's requirements, maturity level, and compliance objectives.
The IT Security Engineers role will be creating, managing and enforcing corporate IT security policies and procedures that meet or exceed our client's industry best practices and are in compliance with PCI and HIPAA regulations.