Enable our clients to execute their divestitures, mergers, and acquisitions in an efficient and accelerated manner to maximize the deal value; investigate accounting irregularities and respond to fraud allegations.
Supervising or leading work streams involving business transactions management, such as divestitures, mergers and acquisitions; performing in or maintaining relational and NoSQL Databases, especially utilizing one or more of the following environments: Data Visualization Tools.
The Senior Security Engineer works with the IT team, and others, to review, select, configure, and deploy technical controls in order to meet specific security requirements, and defines processes and standards to ensure that security configurations are maintained.
Will identify all technical issues of your assigned accounts to assure complete client satisfaction throughout the sales process, and establish and maintain positive relationships with your client's technical staff.
Maintains up-to-date baselines for the secure configuration and operations of all in-place devices, whether they be under direct control (i.e., security tools) or not (i.e., workstations, servers, network devices, etc.).
As a Senior Information Security Associate, you will review IT controls and conduct network testing for regulatory and security compliance, primarily at community banking institutions. You will review technical policies and control documents, perform onsite audit work, and author reports and work papers as directed.
Serves as primary responder and point of contact in the response, forensic investigation, analysis and resolution of security incidents. Performs routine technical security audits of user accounts, system and network configurations.
IT Security Operations Center -Analyst to join the newly created Houston SOC Team. The IT Security Operations Center -Analyst position requires information gathering, analytics aptitude, problem-solving skills and team spirit to minimize and/or neutralize risk.
Work with Hub IT Security Ops Manager to maintain and administer the company's vulnerability management program to identify security risks and recommend corrective actions by the responsible system managers.