In this role, the selected candidate will perform vulnerability assessments utilizing IT security tools and methodologies; perform assessments of the IT security/risk posture within the IT network, systems and software applications, in addition to assessments of vendors.
In this role, you will be involved in the planning, implementation, administration, support and documentation of a variety of IT infrastructure systems. This will include software installation, rolling out software and hardware upgrades, monitoring and updating network and IT systems, providing technical support to users. Must ensure that all systems and projects are completed in adherence with the global company standards as well as best practices.
The Card Security Analyst is responsible for performing detailed analysis of card related data (both credit and debit) and provides extensive research and reporting on fraud trends, losses, and prevention.
In this role, the selected candidate will identify project risks and impediments, notify management, and proactively work with other members of the team to complete assigned tasks as defined by project scope, timelines, and budgets.
The Security Engineer is a part of a key team of Information Security and Compliance professionals that supports project initiatives and technologies by providing security consulting services across the enterprise.
In this role, the selected candidate will ensure that the client technical teams are meeting relevant security standards, passing security audits, and otherwise reasonably protecting company and customer data.
In this role, the selected candidate will act as a trusted technical security advisor to all levels of the organization for a variety of information security projects that arise from current business and technological developments.
The ideal candidate is expected to provide quality first-tier security event management, including data gathering, policy analysis, operational security support for vulnerability management initiatives/campaigns across Amazon's global enterprise environment.
The Information security officer is primarily responsible for ensuring data security within their organization. They are in charge of implementing effective technology solutions that prevent internal and external malicious users from compromising data integrity.
In this role, you will demonstrated ability to identify issues, develop solutions, and manage implementation of projects. Exercises independent and sound judgment in methods, techniques and evaluation criteria for obtaining results.