Epic Ambulatory Analyst - FTE - Miami Hybrid
Securities analyst job at HCTec
Sr. Ambulatory Application Analyst (No 3rd party, No C2C, No 1099)
Start: ASAP
Length: FTE
Salary range: 88-115K
Onsite/Remote: starting 50% hybrid but could move to 100% onsite and need someone that will be okay with that
Job Scope/Summary:
Serves as a mentor and technical resource for junior analyst to gain expertise on more specialized and complex clinical applications and functions.
Contributes to the planning of application development and deployment, looking at existing information to identify areas for improvement. Independently provides viable resolution to end-user inquiries and problems related to applications, consulting with appropriate vendors where needed.
Develops or modifies established processes and procedures, leveraging market and industry research, to support application efficiency and improvement.
Generates and analyzes reports for a specific application in order to inform Memorial's decision making process, improve efficiency, and to outline workflow and processes.
Maintains advanced knowledge of current operational workflows that are supported through the business or clinical applications.
Maintains assigned application through partnership with technical experts, vendors, and technology teams to ensure the application continues to support end-users and to mitigate any functional or operational issues. Tests and troubleshoots existing and proposed systems in order to resolve and anticipate application issues, but also to verify accuracy and compliance with Memorial procedures.
Requirements/Certifications:
Ambulatory certification - preferred. Will also consider Epic Certification in other applications like Phoenix, Bones, ClinDoc, Orders, Optime, Beacon, ASAP, Wisdom
3--5 years of Epic Build experience
Cyber Security Analyst
Orlando, FL jobs
Sanford Rose JFSPartners is currently looking for a Cybersecurity GRC Analyst for a full-time opportunity in Orlando. The GRC Analyst supports the security compliance program, tracking completion and remediation of compliance activities, and documenting compliance program evidence.
RESPONSIBILITIES:
Works as a team member in the Cybersecurity Department focusing on IT Security compliance processes and initiatives, acting as the central point of contact and collaborating with other organization units within the company in these matters
Supports security compliance program, ensuring the identification, tracking, prioritization, and remediation of all internal and external compliance requirements; also supports Internal Audit activities and remediation requirements.
Ensures adequate and effective IT controls exist to meet applicable current and future security compliance requirements found in laws, regulations, frameworks such as requirements to comply with SOX (Sarbanes-Oxley)
Coordinates the information security compliance efforts of all internal and outsourced functions that have one or more information security-related responsibilities, to ensure that organization-wide information security compliance efforts are consistent.
Assists with the implementation of company-wide security awareness and education programs that are aligned with security policy, standards, regulatory requirements, and industry practices.
Assists with vulnerability management reporting including patch management tracking and software code analysis reports.
REQUIRED TECHNICAL SKILLS:
3+ years of experience in an IT role focusing on information security and IT compliance
Knowledge of regulatory compliance regulations (PCI, SOX, PII)
Familiarity with industry standard frameworks such as NIST and ISO
Knowledge of information technology systems and processes, network infrastructure, data architecture, data processes and protocols
Experience with GRC tools (Oracle, RSA Archer, MetricsStream, etc.)
At Sanford Rose Associates - JFSPartners, we specialize in Finance & Accounting, Legal, and Information Technology recruitment, dedicated to helping professionals like you discover the perfect career opportunities. With a track record of assisting thousands of professionals nationwide, we are prepared to leverage our expertise on your behalf. Partnering with us means gaining access to serious candidates, minimizing hiring errors, and ensuring top-tier hires, all while navigating the hiring process with confidence. We understand the significance of finding the ideal role and aligning with an organization that shares your values.
Security Analyst
Nashville, TN jobs
Jr. Security Analyst
Our client is currently looking for a Jr. Security Analyst to join their team in a long term contract capacity focusing on an increase in compliance and audit work heading into the new year. This person will be brought on to support an established information security and compliance team. This role is ideal for someone looking to grow in TPA (Third Party Assessment), audit support, compliance operations, NIST frameworks, and GRC practices.
Below is a breakdown of what our enterprise client is looking for in their potential candidate!
Key Responsibilities
Support Third Party Assessments (TPAs) by gathering evidence, tracking documentation, and helping review vendor security controls.
Participate in internal and external audit readiness tasks including evidence collection, control testing preparation, remediation tracking, and audit log review coordination.
Assist with vulnerability scan reporting, ticket creation, and follow-up with technical teams on remediation tasks.
Support intake, documentation, and status tracking of new compliance and security projects.
Help maintain dashboards, risk registers, and compliance reporting metrics within the GRC tool.
Participate in annual assessment activities including contingency plan exercises, incident response tests, access reviews, and other required security program tasks.
Assist with audit log reviews and routine monitoring processes as assigned.
Maintain structured, accurate documentation to support continuous compliance efforts.
Minimum Qualifications
1-3 years of experience in security, IT, audit, or compliance support roles (internships or rotational experience accepted).
Foundational knowledge of NIST frameworks, FISMA requirements, or other security compliance standards (HIPAA, SOC 2, ISO 27001 a plus).
Experience with GRC platforms (ServiceNow, Archer, OneTrust, ZenGRC, etc.) OR strong interest in learning.
Strong attention to detail with the ability to create, edit, and maintain structured documentation.
Proficiency with Microsoft Office and basic workflow tracking tools (Excel, SharePoint, Confluence, Smartsheet, etc.).
Familiarity with basic cybersecurity terminology and frameworks (e.g., CIS Controls).
Experience supporting compliance evidence collection or policy documentation.
Interest in security governance, risk, and compliance as a long-term career path.
Cyber Security Engineer
Knoxville, TN jobs
The Cybersecurity Engineer is responsible for the technical implementation and management of cybersecurity measures. This role involves extensive hands-on work with security technologies, developing and maintaining security protocols, and ensuring the protection of sensitive data. The Cybersecurity Engineer collaborates within the various IT teams to integrate security solutions into business projects and solutions, while supporting overall compliance with HIPAA regulations.
Technical Implementation:
Architect, deploy, and maintain enterprise-grade security technologies, including firewalls, intrusion detection/prevention systems, encryption platforms, and vulnerability management tools.
Implement and support security controls for network infrastructure such as routers, switches, and wireless access points.
Configure, administer, and secure Active Directory and Azure AD environments.
Deploy and oversee endpoint protection platforms and Security Information and Event Management (SIEM) solutions.
Manage Microsoft 365 security capabilities, including conditional access, data loss prevention (DLP), and advanced threat protection.
Evaluate, test, and recommend new security tools, processes, and technologies to strengthen the organization's security posture.
Security Operations:
Continuously monitor systems for security events, investigate alerts, and respond to incidents with appropriate documentation.
Perform ongoing risk assessments and vulnerability scans to identify exposures and drive remediation efforts.
Lead technical response efforts during security incidents or breaches in coordination with the incident response team.
Administer and monitor Identity and Access Management (IAM) systems to ensure secure and appropriate access.
Conduct routine vulnerability assessments and threat analysis to support continual improvement.
Perform digital forensics and incident response activities as needed.
Compliance:
Ensure adherence to HIPAA and all applicable regulatory and security standards.
Design and implement technical safeguards that protect sensitive information and support organizational objectives.
Collaboration:
Partner with IT and business teams to embed security controls into systems, applications, and workflows.
Educate and support staff on cybersecurity awareness, best practices, and evolving threats.
Documentation:
Create and maintain accurate documentation for security configurations, procedures, and incident activity.
Remain informed on current cybersecurity trends and recommend enhancements to existing controls.
Security Audits:
Plan and conduct scheduled and ad-hoc security audits to validate adherence to security policies and standards.
Security Standards and Policies:
Develop, review, and update security policies and standards in alignment with industry best practices and regulatory requirements.
Security Infrastructure Maintenance and Monitoring:
Configure, troubleshoot, and maintain security-related hardware and software.
Implement and manage monitoring tools to detect intrusions and potential security breaches.
Security Strategy Development:
Support the planning, execution, and ongoing refinement of the organization's information security strategy.
Adhere to organizational policies, procedures, and safety standards; complete required training annually; contribute to performance goals and quality improvement initiatives.
Perform additional duties as assigned.
Minimum Education:
Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related discipline required.
Minimum Experience:
Ten (10) years of overall IT experience, including at least five (5) years of hands-on cybersecurity leadership with demonstrated success designing, engineering, and deploying security solutions in an enterprise environment.
Certifications:
Relevant industry certifications such as CISSP, CISM, CISA, CCSP, CEH, Microsoft Azure Engineer, or equivalent are required.
JDE E1 Analyst
Miami, FL jobs
JD Edwards (JDE) Functional Analyst - EnterpriseOne (E1)
Length: ongoing contract (potential contract to hire)
Requirements:
5+ years of hands-on JD Edwards E1 experience (not World only).
Strong customer-facing and communication skills.
Experience with SDLC, Agile, and JDE upgrade/implementation projects.
Knowledge of third-party integrations, Orchestrator, UX One, and JDE toolsets is a plus.
Bachelor's degree in Business, IT, or related field (or equivalent experience).
Security Analyst- Pen Testing
Brookfield, WI jobs
The Security Analyst- Pen Testing plays a critical role in facilitating continued growth and execution within our security practice. This highly skilled and detail-oriented Consultant will have deep knowledge in Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), and Hardware Penetration Testing. The ideal candidate will be responsible for identifying vulnerabilities across software and hardware systems, advising on remediation strategies, and communicating findings clearly to both technical and non-technical stakeholders.
Primary Responsibilities:
Conduct in-depth SAST, DAST, and SCA assessments across a variety of application types (web, mobile, desktop, APIs).
Perform hardware penetration testing on embedded systems, IoT devices, and industrial control systems (ICS), including debug interface discovery, firmware extraction and analysis, and secure boot review.
Develop and maintain threat models, attack trees, and risk assessments for both software and hardware systems.
Identify and exploit vulnerabilities using both manual techniques and automated tools, simulating real-world attack scenarios.
Provide detailed technical reports and executive summaries tailored to different audiences, including developers, engineers, and leadership.
Collaborate with product and engineering teams to prioritize and remediate vulnerabilities, offering secure design and coding recommendations.
Participate in security architecture reviews and code reviews to identify potential weaknesses early in the development lifecycle.
Assist in the development and implementation of security testing methodologies, checklists, and standard operating procedures.
Conduct security tool evaluations and help integrate them into CI/CD pipelines for continuous security testing.
Lead or support red team/blue team exercises, tabletop simulations, and incident response drills.
Stay abreast of the latest security trends, vulnerabilities, and threat actor tactics, techniques, and procedures (TTPs).
Contribute to internal knowledge bases, training sessions, and technical workshops to upskill team members and clients.
Engage with clients to understand their security needs, define testing scopes, and deliver high-quality consulting services.
Ensure all testing activities comply with legal, ethical, and organizational guidelines, including responsible disclosure practices.
Develop and present organized report findings to technical audiences.
Requirements
Professional Qualifications Sought:
Bachelor's degree in computer science, cybersecurity or another related field, desired or significant aligned experience.
Overall experience working in a Pen Tester role in a diverse technical hardware and software environments for more than three years.
Certifications such as: Certified Ethical Hacker (CEH), Certified Hardware Security Professional (CHSP), Certified Mobile and Web Application Penetration Tester (CMWAPT), Offensive Security Certified Professional (OSCP), Certified Information Systems Security Professional (CISSP) or other generally accepted security certifications, are a plus.
Present openness to new ideas, approaches, and technologies to address core business needs and align to risk tolerance.
Exhibit good time management, and presentation skills in virtual and face-to-face environments.
Consistently exhibit strong oral and written communication skills and the ability to present to groups of varying sizes and audiences in ad-hoc and prepared situations.
Technical Qualifications Sought:
Three years of experience independently conducting in-depth SAST and DAST assessments across web, mobile, desktop, and API-based applications using tools such as Burp Suite, Zed Attack Proxy (ZAP) and Nessus.
Referenceable history performing hardware penetration testing on embedded systems, IoT devices, including firmware extraction, reverse engineering and analysis utilizing tools like Binwalk and Ghidra.
Experience analyzing Android and iOS mobile application runtimes using both physical devices and emulators.
Hands-on experience developing and maintaining threat models, attack trees, and risk assessments for both software and hardware systems.
Knowledgeable in identifying and exploiting vulnerabilities using both manual techniques and automated tools, simulating real-world attack scenarios.
History of contributing to the development of detailed technical reports and executive summaries tailored to different audiences, including developers and engineers.
Experience collaborating with product and engineering teams to prioritize and remediate vulnerabilities, offering secure design and coding recommendations.
Successful implementation of security testing methodologies, checklists, and standard operating procedures.
Conduct security tool evaluations on CI/CD pipelines and cloud infrastructure for continuous security testing.
Stay abreast of the latest security trends, vulnerabilities, and threat actor tactics, techniques, and procedures (TTPs).
Contribute to internal knowledge bases, training sessions, and technical workshops to upskill team members and clients.
Engage with clients to understand their security needs, define testing scopes, and deliver high-quality consulting services.
Ensure all testing activities comply with legal, ethical, and organizational guidelines, including responsible disclosure practices.
Travel
Must be available to travel four to six times per year, with no more than 24 days away from home in a calendar year.
Employment locations: Although this is a remote position, we are only open to employment of individuals with their legal residence in the following states: Wisconsin, Illinois, Ohio, Michigan, Indiana, South Dakota, Iowa, Arkansas, North Carolina, Arizona and Florida.
Benefits
Health Care Plan (Medical, Dental & Vision)
Retirement Plan (401k, IRA)
Life Insurance (Basic, Voluntary & AD&D)
Paid Time Off (Vacation, Sick & Public Holidays)
Family Leave (Maternity, Paternity)
Long Term Disability
Training & Development
Work From Home
Work life balance
Great Culture
Auto-ApplySecurity Analyst- Pen Testing
Brookfield, WI jobs
The Security Analyst- Pen Testing plays a critical role in facilitating continued growth and execution within our security practice. This highly skilled and detail-oriented Consultant will have deep knowledge in Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software Composition Analysis (SCA), and Hardware Penetration Testing. The ideal candidate will be responsible for identifying vulnerabilities across software and hardware systems, advising on remediation strategies, and communicating findings clearly to both technical and non-technical stakeholders.
Primary Responsibilities:
* Conduct in-depth SAST, DAST, and SCA assessments across a variety of application types (web, mobile, desktop, APIs).
* Perform hardware penetration testing on embedded systems, IoT devices, and industrial control systems (ICS), including debug interface discovery, firmware extraction and analysis, and secure boot review.
* Develop and maintain threat models, attack trees, and risk assessments for both software and hardware systems.
* Identify and exploit vulnerabilities using both manual techniques and automated tools, simulating real-world attack scenarios.
* Provide detailed technical reports and executive summaries tailored to different audiences, including developers, engineers, and leadership.
* Collaborate with product and engineering teams to prioritize and remediate vulnerabilities, offering secure design and coding recommendations.
* Participate in security architecture reviews and code reviews to identify potential weaknesses early in the development lifecycle.
* Assist in the development and implementation of security testing methodologies, checklists, and standard operating procedures.
* Conduct security tool evaluations and help integrate them into CI/CD pipelines for continuous security testing.
* Lead or support red team/blue team exercises, tabletop simulations, and incident response drills.
* Stay abreast of the latest security trends, vulnerabilities, and threat actor tactics, techniques, and procedures (TTPs).
* Contribute to internal knowledge bases, training sessions, and technical workshops to upskill team members and clients.
* Engage with clients to understand their security needs, define testing scopes, and deliver high-quality consulting services.
* Ensure all testing activities comply with legal, ethical, and organizational guidelines, including responsible disclosure practices.
* Develop and present organized report findings to technical audiences.
Security Analyst - 3
Madison, WI jobs
Assist DWD's security team with general security maintenance duties, inclusive of account provisioning - password resets - account deletions. Also assist with security analysis and design, compliance and risk assessment activities and provide consultation services regarding security best practices.
Hardware/Software Environment:
Knowledge of multiple computer platform security admin tools expected; inclusive of mainframe RACF, network AD, MS -outlook, multi -factor, and others.
Blockchain Security Analyst
Miami, FL jobs
Job Description
Octagon Talent Solutions is a full-service technology recruitment and staffing company based in South Florida. We humanize technical recruitment by identifying candidates' long-term career goals and assessing cultural fit when presenting opportunities. Our focus on long-term relationships helps ensure placements that last.
Job Overview:
Be part of a pioneering team as a Blockchain Security Analyst, where your expertise will shape the future of digital asset security. We are seeking a highly skilled professional to lead advanced blockchain investigations, analyze cryptocurrency transactions, and explore smart contract interactions. In this role, you'll also deliver engaging training sessions on cutting-edge investigative techniques, working alongside top cybersecurity and legal professionals. Your insights will impact the industry through detailed analytical reports, expert consultations, and innovative solutions. If you're passionate about blockchain technology, have a solid background in crypto investigations, excel in smart contract analysis, and enjoy mentoring others, this is your opportunity to make a difference in the rapidly evolving fields of blockchain analytics and cybersecurity.
Responsibilities:
Lead Complex Blockchain Investigations
Conduct advanced blockchain transaction analysis to trace cryptocurrency movements and identify patterns.
Investigate smart contract vulnerabilities and potential exploits using sophisticated forensic tools.
Drive Technical Innovation
Develop new methodologies for blockchain monitoring and analysis.
Design custom tools and automation scripts to enhance investigation efficiency.
Shape Industry Knowledge
Create and deliver expert-level training programs for law enforcement and industry professionals.
Produce comprehensive technical reports to influence industry best practices.
Lead Cross-functional Collaboration
Collaborate with cybersecurity experts and legal teams to advance investigations.
Contribute to the development of industry standards for blockchain security.
Professional Growth Opportunities
Work with state-of-the-art blockchain analysis tools and AI-powered platforms.
Gain exposure to emerging cryptocurrencies, DeFi protocols, and cutting-edge technologies.
Play a pivotal role in shaping the future of digital asset security.
Requirements:
Bachelor's degree in Computer Science, Cybersecurity, Forensic Analysis, or related field. Advanced degrees or certifications in blockchain or cybersecurity are a plus.
Strong written and verbal communication skills, with experience preparing detailed investigative reports and presenting findings.
Hands-on experience with blockchain analysis platforms (e.g., Chainalysis, CipherTrace, Crystal Blockchain).
Proficiency in Python, JavaScript, or similar programming languages for blockchain data analysis.
Deep understanding of DeFi protocols, DEXs, and cross-chain bridges.
Knowledge of blockchain ecosystems (Bitcoin, Ethereum, Solana, etc.).
Experience using smart contract security tools (e.g., Slither, Mythril, Echidna).
Familiarity with smart contract programming languages (e.g., Solidity, Rust).
Knowledge of anti-money laundering (AML) and know-your-customer (KYC) regulations.
Proven expertise in blockchain forensics and cryptocurrency investigations.
Experience with graph analysis tools and data visualization software.
Understanding of MEV, frontrunning, and DeFi attack vectors.
Exceptional problem-solving skills with strong attention to detail.
Ability to work with emerging technologies such as Layer 2 solutions, zk Proofs, and MEV protection.
Qualifications:
Experience in instructional design or delivering training in blockchain fundamentals and investigative techniques.
Familiarity with data analysis tools and methodologies.
Knowledge of cryptographic protocols and security measures.
Previous experience in teaching or mentoring, particularly in technology or cybersecurity.
Ability to develop and facilitate training sessions for diverse audiences, including law enforcement and non-technical stakeholders.
Experience with non-EVM platforms such as Solana, Algorand, and others.
Join a team at the forefront of blockchain innovation and make a lasting impact in the world of digital security!
Security Analyst
Scottsdale, AZ jobs
Link Technologies is seeking a Software Development Architect for a well-established client in Scottsdale, AZ. Established in 2000, Link Technologies has provided professional services in the areas of Information Technology, Engineering, Business Support, Project Management, and Cyber Security/Information Assurance to some of America's top Corporations and Government Agencies at the Federal, State, and Local level. Seeking a Security Analyst for a 6-month contract to hire with a well-established client in the Scottsdale, AZ area
Job Description
Position Description:
The Security Analyst is a member of the security team and performs technical activities for delivering effective host, network, data and application security services. This position will have primary responsibility for security platforms in the production and test environments and will monitor and maintain network and computer security policies with a focus on managing vulnerabilities.
Major Areas of Responsibility:
·
Assists in planning, directing and coordinating activities, specifically relative to Information Security
·
Assists in developing and enforcing the organization's security policies, standards, and guidelines, security awareness, security information portion of the business continuity and disaster recovery plans, and all industry and government compliance issues
·
Assists in incorporating the design, deployment, management, control, and updating of platform and user-specific security policies on a diverse range of internal hardware platforms supporting various software and operating systems
·
Conducts risk management analysis to identify areas of risk and to develop security measures to prevent losses
·
Monitors use of data files and regulate access to safeguard information in computer files.
·
Works with business owners, IT managers, staff, and vendors in order to provide timely and efficient IT coordination of security services to meet the needs
·
Create reports on status of information security programs and projects, as required
·
Communicates with senior executives through oral and written reports and presentations, as required
·
Develops and implements IT system security plans, projects and initiatives
·
Plans, implements, manages, and coordinates security measures and controls for information systems to regulate access to computer data and prevent unauthorized modification, destruction, or disclosure of information
Qualifications
Requirements:
• Bachelor degree or equivalent experience in engineering, technology, or related field
• Minimum 2 years security experience
• Extensive background with Nessus Vulnerability Scanner
• Understanding of PEN testing performance and remediation
• Experience with Microsoft Advanced Threat Analytics
• Ability to create dashboards in Splunk Analytics
• Solid understanding of Cisco ASA
• Experience in identifying network security vulnerabilities
• Willingness to respond swiftly and effectively to network security events
• Must work well in a team environment
• Must be self-motivated and able to work independently
• Experience at working both independently and in a team-oriented, collaborative environment is essential
• Can conform to shifting priorities, demands, and timelines through analytical and problem-solving capabilities
• Reacts to project adjustments and alterations promptly and efficiently
Working Conditions:
• Expected work hours are Monday through Friday, regular business hours
• Some travel required; may be extensive depending on project
• Flexible during times of change
Additional Information:
• All candidates must be legally eligible to work for any employer in the United States without sponsorship or a third party employer
• This role is on-site; remote work is not an option unless otherwise specified
Additional Information
All your information will be kept confidential according to EEO guidelines.
AI & Cyber SME
Knoxville, TN jobs
The Senior Principal Consultant will work as a senior expert on the successful delivery of projects for clients as a member of a project team within a market program. This includes providing technical expertise to the project manager and team members with initiating, planning, executing, monitoring and controlling, and closing projects. This position also includes maintaining relationships with clients and key decision-makers to help identify follow-on Business opportunities and maintain customer intelligence.
What You Will Do:
* Provide expertise on project tasks to ensure quality services are delivered on schedule and within the available budget to meet customer requirements.
* Define project tasks, estimate task duration, and develop a project schedule as part of developing a project management plan
* Review project management plans to understand the scope, schedule, and assigned work authorization
* Provide technical expertise to support the execution of project tasks
* Develop briefing materials and write reports to communicate concepts and analysis results to clients and end users
* Lead research and data analysis, including but not limited to assisting with conducting customer or stakeholder analyses
* Prepare written documents, and reports, and provides presentations to clients.
* Develop conclusions and recommendations, write reports, and assist with client presentations
* Track and reports hours spend executing projects
* Work with individuals at all levels, provide input to reports and other deliverables, execute multiple assignments, meet agreed deadlines, and adjust to changing client demands
* Develop relationships with existing customers to facilitate the development of new business.
* Identify new business opportunities with existing customers for current and/or additional services
* Participate in marketing activities, conference presentations, technical whitepapers
* Assist with proposal development, including writing proposals, estimating the level of effort
* Learn, understand and be conversant in ABSG Industrial Cybersecurity products and services
* Review published reports and news articles about existing and potential new clients to identify customer intelligence
* Networking to meet new potential clients
* Serves as senior technical expert guiding project tasks and ensuring quality, schedule, and budget compliance.
* Project management with planning, sequencing tasks, estimating durations, and developing project schedules.
* Performs quality assurance on deliverables and tracks project execution metrics.
* Maintains and develops relationships with clients and key decision-makers.
* Actively participates in client meetings, presentations, and proposal development.
* Identifies new business opportunities through client interactions and market intelligence.
* Communicates client needs internally and contributes to proposal writing.
* Leverages subject matter expertise to drive growth and expand services.
What You Will Need:
Education and Experience
* Bachelor's degree in Computer Science, Business, or a recognized equivalent from an accredited university.
* Experience will be considered in lieu of education, preferably in data processing or a related field.
* Typically requires a minimum of five (5) years of working with a Customer Relationship Management System (CRM).
* Proven experience in Systems Development environment with project management responsibility for successful projects.
* Extensive IT and functional experience in cultivating positive customer relationships. experience working in organizations to support services provided to internal/external clients
* PMP Certification is preferred.
* Microsoft Dynamics CE experience preferred
Knowledge, Skills, and Abilities
* Analytical and problem-solving capabilities.
* Strong understanding of sales, marketing, and customer service processes, to ensure functionally correct implementation.
* Strong understanding of Dynamics 365 CRM design, structure, functionality, and processes.
* Knowledge of CPQ (Configure, Price, Quote), PRM (Partner Relationship Management), CLM (Contract Lifecycle Management), and Sale Compensation Management applications, and their functionality.
* Managed complete life cycle projects involving multiple cross-functional business teams.
* Excellent verbal, written, and presentation skills consistent with a client group, including senior managers & executives.
* Knowledge of Microsoft Power Platform, working with Power BI to build data visualization, and Power Automate implementing business workflow.
* Strategic while also able to perform tactical duties.
* Self-starter, highly motivated with the ability to work with limited supervision.
* Experienced in the design and maintenance of business applications.
* Ability to obtain a working knowledge of the ABS Health, Safety, Quality, and Environmental Management System.
Salary:
$210k - $220k
Reporting Relationships:
Reports to a Manager, Director, or Executive level position and has no direct reports.
Auto-ApplyCybersecurity Threat Detection Analyst
Juno Beach, FL jobs
Kforce has a client that is seeking a Cybersecurity Threat Detection Analyst in Juno Beach, FL. This job performs ongoing cybersecurity risk reviews focusing on insider threats for new and existing technologies, employees, and business processes. Individuals develop requirements for and implement insider risk detection tools and programs, as well as influence the company's insider threat policies and control framework. This position collaborates with HR, Legal, IT, and business units to identify behavioral indicators, select appropriate monitoring tools, and deploy controls to meet specific insider risk requirements. Employees in this role build processes and standards to ensure insider threat detection capabilities continue to be effective.
Responsibilities:
* Administers, operates and monitors the company insider risk detection tools, user behavior analytics, and threat hunting capabilities to identify potential insider threats
* Acts as subject matter expert for insider risk technology stacks (e.g., user behavior analytics, data loss prevention, privileged access monitoring)
* Participates with security architecture to identify, evaluate and recommend new insider risk technologies for suitability within the company's environment and security posture
* Communicates ongoing insider risk activities, investigations, and risk measurements or mitigations at multiple organizational levels while maintaining confidentiality
* Conducts behavioral analysis and risk assessments of employees with elevated access or suspicious activity patterns
* Coordinates with HR, Legal, and management on insider threat investigations and case management
* Participates in organizational projects and security awareness programs, as required
* Performs other job-related duties as assigned* To be considered for this position, candidates must have experience in a similar role, or they must possess significant knowledge, experience, and abilities to successfully perform the responsibilities listed
* Relevant education and/or training will be considered a plus
Cyber Security Analyst - AZ
Chandler, AZ jobs
We are seeking an experienced Cyber Security Analyst to join our cybersecurity team. In this critical role, the successful candidate will be tasked with the comprehensive monitoring, detection, analysis, and response to cybersecurity incidents, ensuring the integrity, confidentiality, and availability of information assets. Leveraging deep technical expertise and a strategic approach to cybersecurity, this position calls for a proactive and vigilant professional dedicated to identifying vulnerabilities, mitigating risks, and leading incident response efforts. The ideal candidate will possess deep technical knowledge, excellent communication skills, and the ability to coordinate incident response activities across the organization. This position requires a blend of analytical prowess, technical expertise, and a strategic mindset to protect the company's assets from internal and external threats
Essential Duties and Responsibilities
Continuously monitor and evaluate the organization's cybersecurity posture, using securitytools and techniques to detect potential threats and vulnerabilities across a wide range ofsystems and environments.
Respond to, investigate, and manage security incidents with precision and expertise, frominitial detection through to resolution, ensuring minimal impact to the organization.
Serve as a key contributor to the Security Operations team, enhancing its operationalcapabilities through the development and implementation of security measures and protocols.
Mentor and guide junior security analysts within the security operations team, fostering aculture of continuous learning and professional development. Share knowledge and insights onthe latest cybersecurity trends, tools, and practices to enhance team capabilities.
Develop, refine, and maintain incident response playbooks, procedures, and guidelines inalignment with industry best practices.
Engage in proactive threat hunting initiatives, leveraging threat intelligence and cybersecurityframeworks to identify and neutralize potential threats before they manifest into incidents.• Document and communicate detailed incident reports and analyses, ensuring transparency andclarity in the post-incident review process to improve future security measures and responses
Stay current with new threats, technologies, and trends in cybersecurity, contributing to thecompany's IT security strategy and roadmap.• Participate in continuous improvement activities that enhance operational efficiency throughthe implementation of automation.
Share knowledge and insights with team members and across the organization to foster aculture of security awareness and resilience
Knowledge, Skills, and Abilities
Bachelor's degree in Cyber Security, Information Assurance, Computer Science, Engineering, ora related technical field is preferred or equivalent combination of experience, education(including other relevant degree or educational programs), and certifications.
Professional security certifications such as GCIH, GCFA, CISSP, or similar are highly desirable
Education & Experience
3-5 years of experience in cybersecurity, with a focus on security operations, incidentresponse, or related fields.
Proven experience in security systems administration, SIEM, threat intelligence platforms,vulnerability management, and forensic tools.
Strong understanding of cybersecurity principles, IT systems, and network security.
Demonstrated proficiency in Windows and Linux operating systems, with a solid understandingof cloud services Excellent communication skills, with the ability to convey complex security concepts to bothtechnical and non-technical stakeholders.
Demonstrated ability to act with integrity, professionalism, and confidentiality.
Organized, adaptable, and capable of managing multiple high-priority tasks in a fast-pacedenvironment
Defense Agencies Initiative (DAI) Analyst #1401
North Carolina jobs
LABOR CATEGORY: Defense Agencies Initiative Subject Matter Expert
SME II, SME III
JOB DESCRIPTION: Sehlke Consulting is providing Defense Agencies Initiative (DAI) migration and training support to the United States Marine Corps ensuring a smooth transition to their new accounting system and reporting tool. Currently seeking qualified Subject Matter Experts at all levels to contribute towards the first military service's transition to DAI.
This includes services that directly support the Standard Accounting Budgeting and Reporting System (SABRS) to DAI business system migration, training, and sustainment of all modules to include but not limited to: Budget-to-Report (B2R), Procure-to-Pay (P2P), Order-to-Cash (O2C), Cost Accounting (CA), Oracle Time and Labor (OTL) and reporting through Oracle Business Intelligence Enterprise Edition (OBIEE) Duties and expectations include, but are not limited to the following:
Develop a Training Plan to ensure user training needs are met and the client's specific training is provided.
at support access of all users and defined training needs.
Provide Over the Shoulder DAI Support.
Develop In-Person and Virtual USMC specific core DAI Suite Training materials (content development) and curriculum for USMC roll-out prior to training sessions, ensuring USMC can accurately record and report business events impacting USMC financial statements; the current DAI User Productivity Kit (UPK) can be accessed.
Develop system documentation, user guides and interactive training materials specific to the USMC configuration, including instructions on system setup and operations specific to user group audiences, to ensure proficiency across the user base.
Assist with drafting process change Policy and updating of Standard Operation Procedures.
Manage DAI data configurations; engage and facilitate communications with client and subordinate commands.
Financial Statement audit inquiry responses during transition efforts and develop and maintain audit related documentation.
CLEARANCE REQUIREMENTS: Secret or ability to achieve
EDUCATION REQUIREMENTS: Desired: Bachelor's Degree; ORACLE Certifications; DoD FM Certified, CDFM,
CERTIFICATION REQUIREMENTS: Related Science and Technology certifications
EXPERIENCE REQUIREMENTS: 3 to 20 + Years, relevant experience with business processes, training and technical solutions using functional knowledge of the Oracle E-Business Suite and all DAI Oracle Modules.
SYSTEM SPECIFIC EXPERIENCE REQUIREMENTS:
ORACLE Time and Labor System
iProcurement
ORACLE Business Intelligence Tool
DAI Reimbursable Work Orders (RWOs)
ADDITIONAL REQUIREMENTS:
Travel required at least two weeks per year.
Must be able to lift 50 pounds.
Ability to effectively communicate orally and written.
Ability to multi-task and employ critical thinking skills.
To be eligible for employment, you must be fully vaccinated, except in limited circumstances where an employee is legally entitled to an accommodation, by January 4
th
, 2022, or your start date, whichever is second in time. People are considered fully vaccinated for COVID-19 two weeks after receiving the second dose in a two-dose series or two weeks after receiving a single-dose vaccine. If you think you are entitled to an accommodation, please advise your Sehlke liaison, and they will consult our human resource leads for consideration.
Founded in 2011, Sehlke Consulting is headquartered in Arlington, VA - and an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.
Auto-Apply737 P-8 Electrical - DEFENSE
Jacksonville, FL jobs
PAY RATE: $26-31/hour
We are a national aerospace and defense staffing agency seeking highly qualified candidates for a position with a top-tier client.
Job Details:
Job Type: Contract (12 months with potential for extension)
Clearance: Eligible to obtain a Secret Clearance
Industry: Aerospace / Defense / Aviation
Benefits: Medical, dental, and vision (Cigna)
Perks: Bonus potential + Priority access via Tier 1 supplier
Openings Nationwide: Thousands of opportunities across the U.S.
Qualifying Questions:
Are you a U.S. person as defined under ITAR regulations?
Do you meet the educational and experience requirements for this role?
Can you commute to the job location or relocate if necessary?
Summary:
Work in a dynamic Maintenance, Repair, and Overhaul (MRO) environment with a focus on wellbeing, work/life balance, and ethical team culture
Collaborate in an environment emphasizing openness, innovation, safety, and first-time quality
Support MRO and Component Operations for military, commercial derivatives, fighter aircraft, and aircraft component maintenance, repair, and overhaul
Adhere to established processes, maintain accurate work records, and ensure contractual and regulatory compliance
Maintain regular and predictable attendance and work at heights using fall protection equipment
Obtain Fall Protection Certification per OSHA regulations (1926, 1910 Subpart D)
Perform aircraft electrical work on the P-8 aircraft
Handle and terminate fiber and wire bundles
Read and interpret blueprint schematics
Work independently with minimal supervision
Requirements:
Eligible to obtain a Secret Clearance
High school diploma or GED, with 1+ year of related experience, or an equivalent combination of education and experience
3-5 years of experience in aircraft electrical maintenance
Background with 737 aircraft preferred
Ability to properly handle fiber
Ability to terminate and install wire bundles and read schematics
Ability to work without supervision
Open to military and/or corporate backgrounds
Must be a U.S. Citizen (as defined by ITAR).
About Us:
The Structures Company is a premier national aerospace and defense staffing agency specializing in contract, contract-to-hire, and direct hire placements. We deliver expert workforce solutions across engineering, IT, production, maintenance, and support roles.
As trusted partners to major aerospace OEMs and Tier 1 suppliers, we connect professionals with opportunities to grow and excel in the aviation and aerospace industries.
Eligibility Requirements:
Must be a U.S. Citizen, lawful permanent resident, or protected individual under 8 U.S.C. 1324b(a)(3) to comply with ITAR regulations.
Keywords: aerospace, aviation, engineering, maintenance, aircraft design, defense
Take your career to new heights-apply today!
#jobad
Information Security Analyst
Bradenton, FL jobs
Job Description
CoAdvantage is a leading human resource solutions provider for small to mid-sized companies. We are HR experts who partner with small businesses nationwide to administer payroll, benefits, workers' compensation and core HR management. Headquartered in Bradenton, Florida, CoAdvantage has offices throughout Florida, Georgia, Alabama, Texas, Oklahoma, Colorado, California, North Carolina, New Jersey and New York, and serves more than 100,000 worksite employees in all 50 states. We're looking for the best professionals in our markets who are interested in building a successful and rewarding career and be part of a focused, energetic team dedicated to delivering excellence to America's small business owners.
Position Summary:
The IT Security Analyst participates in the execution and monitoring of IT Security related activities that safeguard the company's information and technology assets. Primary responsibilities include participating in the development of new, and the operation of existing IT Security programs, procedure development and standards documentation. Ensures the appropriate information security access controls are in place and applied consistently.
Review daily and periodic data to identify, report, and remedy vulnerabilities.
Document, prioritize, and analyze security threats, incidents and key metrics.
Knowledge of information security principles, including risk assessment and management, Cyber security defenses, threat and vulnerability management, incident response, application security, and identity and access management.
Identifies, researches, and resolves technical problems that arise within enterprise security applications and tools. Manage vendor relationship for enterprise security applications and tools.
Respond to SSAE18 requests and other questionnaires. Audit vendor and remote sites for physical and logical security.
Participate in breach investigations and provide subject matter expertise for an effective investigation.
Essential Job Functions:
Identify, plan, develop and implement automation of routine tasks
Remediate issues occurring with any IT security systems including but not limited to unexplained system outages, cyber security incidents, issues with data collection feeds or interfaces the day-to-day administration of information security tools and devices, alert response and analysis for security incident response actions. Perform forensic research and images as needed
Update information security metrics
Assist in documenting and updating information security standards and procedures
Assess information systems and company processes are safe and secure for information handling
Recommends, tests, schedules and implements upgrades and patches that may affect enterprise as well as the enterprise security applications and the servers they reside on
Given the confidentiality needs of this role, the highest levels of personal integrity, professionalism, judgment, and maturity are expected
Participates in special projects and performs other duties as assigned
Required Skills and Experience:
4 year Degree in Technology or Business or equivalent combination of relevant experience, education and training
2-4 years in the IT security field preferred
Strong background in maintaining operational computer security and application security, scripting languages (primarily PowerShell), and Active Directory
Working knowledge of but not limited to: API, application security, IPS, network monitoring tools, antivirus, identity management and user provisioning, risk assessments, audits, security testing and auditing, security intrusion detection, security maintenance, and security policy
Strong working knowledge of relevant laws, regulation, and standards relating to information security, including HIPAA, HITRUST, ISO 27001, NIST, PCI-DSS, etc
Preferred Information Security certifications such as Security+, CISSP, GPEN, etc. or other industry -specific certifications such as Microsoft or Cisco
Passion for customer service and problem solving
Ability to prioritize and balance multiple tasks
Continuous Improvement: Seeks efficiencies in daily work and projects; Brings new and creative suggestions to the table; Anticipates roadblocks, problems or obstacles in advance and creates or proposes solutions to overcome; Uses innovative strategies to continually improve the quality or output of work and/or generate executable business solutions; seeks to continually improve and develop skills
Communication: Seeks clarity; Asks questions to gain full understanding and is willing to ask for help; keeps management aware of project progress and shifting priorities; Willing to give feedback to others; communicates both cross functionally and upwards within the organization; uses professionalism in communication
Accountability and Ownership: Exercises self-discipline; Accepts accountability for achievement of goals and objectives; Removes blame; Shows a personal commitment to the team and the function/role; Can demonstrate “upward accountability”; Takes ownership of issues and sees them through to completion
Results Driven Execution: Acts with a sense of urgency; Takes initiative on projects and in daily work; pushes to keep tasks on schedule and plans work; accordingly, addresses challenges appropriately to continue focusing on the end result
Collaboration and Team Oriented: Assumes the good intentions of others; Inclusive; Puts the needs and interest of the team first; Recognizes peers; Maintains positivity and encouragement; Has a deep commitment to the team and the objectives of all members; Is willing to step outside of his/her scope for the betterment of the broader organization.
EOE
CoAdvantage is committed to providing equal employment opportunities to all employees and applicants without regard to race, color, religion, national origin, ancestry, citizenship status, age, sex (including pregnancy, childbirth, breast feeding and pregnancy-related medical conditions), gender, gender identity or expression, sexual orientation, marital status, uniform service member and veteran status, disability, genetic information, or any other characteristic protected by applicable federal, state, or local laws and ordinances.
#LI-HYBRID
Powered by ExactHire:187834
Sr. Security Analyst
Durham, NC jobs
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. Security Analyst
On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC.
Sr. Security Analyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. Security Analyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. Security Analyst Start Date
ASAP
Sr. Security Analyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in
Word
format only.
Sr. Security Analyst
Durham, NC jobs
Procom is a leading provider of professional IT services and staffing to businesses and governments in Canada. With revenues over $500 million, the Branham Group has recognized Procom as the 3rd largest professional services firm in Canada and is now the largest “Canadian-Owned” IT staffing/consulting company.
Procom's areas of staffing expertise include:
• Application Development
• Project Management
• Quality Assurance
• Business/Systems Analysis
• Datawarehouse & Business Intelligence
• Infrastructure & Network Services
• Risk Management & Compliance
• Business Continuity & Disaster Recovery
• Security & Privacy
Specialties• Contract Staffing (Staff Augmentation)
• Permanent Placement (Staff Augmentation)
• ICAP (Contractor Payroll)
• Flextrack (Vendor Management System)
Job Description
Sr. Security Analyst
On behalf of our client, Procom Services is searching for a Sr. Security Analyst for a contract opportunity in Durham, NC.
Sr. Security Analyst Job Details
Responsible for user account administration in a multi-platform environment and ensure that administration procedures are aligned with overall Information Security policies and standards. Assist in the development of access controls to safeguard customer systems against accidental or unauthorized modification, destruction or disclosure.
Maintain user access to securable customer system resources (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange) performing tasks such as: creation / configuration of user logon Ids and updating access control lists, access provisioning and access removals and access terminations.
Perform detailed analysis of access requests/processes and provide recommendations for improvement to senior team members and Information Security management.
Educate information / resource owners in the implementation of necessary information security controls.
Perform standard and non-standard processing of security authorization requests.
Work with resource owners to determine appropriate security policies for securable customer resources.
Provide on-call support for after-hours system access issues and troubleshoot system access problems and failures.
Report suspected information security misuse to manager or director.
Assist resource owners and IT staff in understanding and responding to security access exceptions.
Sr. Security Analyst Mandatory Skills
- Bachelor's degree in Computer Science.
- 2 years of security administration experience, or related technical system administration experience.
- In lieu of degree 5 years of security administration experience.
- Familiarity with audit and risk-related methodologies; such as COBIT and HIPAA.
- Systems administration experience within other aspects of IT
- Demonstrated security administration experience on two or more platforms (UNIX, OS390 Mainframe, iSeries, Windows / Active Directory, Outlook Exchange)
- Demonstrated experience working with a managed services organization.
- Demonstrated experience working with a request ticketing system, such as Triole.
- Strong analytical and problem-solving skills.
- Ability to present and discuss technical information to users with varying technical expertise.
- Proven ability to work under stress in emergencies. Flexibility to handle pressure from many directions simultaneously.
- Must be detail-oriented with a high level of accuracy.
- Excellent written and verbal communication skills.
- Demonstrated ability to develop and maintain collaborative working relationships across multiple teams.
- Strong customer focus and the ability to manage customer expectations.
- Must have strong team-oriented interpersonal skills and the ability to effectively interface with a wide variety of people.
- Demonstrated commitment to continuous process improvement.
- CISSP, CISA, or other security / audit / field related certifications a plus
Sr. Security Analyst Start Date
ASAP
Sr. Security Analyst Assignment Length
7+ months
Additional Information
All your information will be kept confidential according to EEO guidelines. Please send your resume in Word format only.
Information Security Analyst
Tampa, FL jobs
As an Information Security Analyst, you will have shared responsibility for implementing and maintaining company's security strategies and services while providing security guidance based on industry standards and best practices. The ideal candidate will ho have an educational background and/or experience to maintain and support assigned information security technologies with general leadership oversight.
*This position is located out of our Tampa, FL corporate office.
2 days a week in office are required*
Some of the regular responsibilities may include:
Provision, manage, monitor, test, and decommission security tools and applications.
Attend and lead small project meetings and enforce best practices.
Apply specialized security technical knowledge.
Evaluate, plan and implement security projects.
Remain current on assigned security tools and applications and apply skilled understanding of troubleshooting.
Document and resolve moderately complex problems.
Report progress to leaders.
Monitor and analyze Identity security incidents, and provide recommendations for remediation
Other duties as assigned or required.
Experience to be successful:
IT security risks and mitigation strategies.
Security Incident Response
Security frameworks, including ISO and NIST.
Company IT and HR policies.
Various IT security-related regulatory requirements.
IT security logging and monitoring strategies.
Deployment and use of sophisticated IT security monitoring tools.
Educational background: Bachelor's degree in computer science, Information Systems, or other related field; or has 2-5 years of relevant experience.
Technical Skills to understand the role:
Analytical ability
Analyzing Security System Logs, Security Tools, and Data
Communicating Up, Down, and Across All Levels of the Organization
Creating, Modifying, and Updating Security Information Event Management (SIEM)
Deep Understanding of Risk Management Frameworks
Discovering Vulnerabilities in Information Systems
Evaluating and Deconstructing Malware Software
Familiarity with Security Regulations and Standards
Implement and Maintain Security Frameworks for Existing and New Systems
Maintaining Security Records of Monitoring and Incident Response Activities
Monitoring Compliance with Information Security Policies and Procedures
Network and System Administration Experience
Responding to Requests for Specialized Cyber Threat Reports
Performing Cyber and Technical Threat Analyses
Performing Security Monitoring
Producing Situational and Incident-Related Reports
Providing Host-Based Forensics
Providing Timely and Relevant Security Reports
Responding to Security Events
Supporting and Managing Security Services
#LI-MB1
Benefits may include:
Comprehensive medical, prescriptions, dental and vision plans
401(k) plan with a discretionary company match
Shareholder Purchase and Reinvestment Plan
Basic life and accidental death and dismemberment insurance premium paid by the company
Voluntary supplemental life insurance for employees, spouses and dependent children
Fertility and Family Building Benefits
Paid Disability benefits
Paid time off programs
11 Company paid holidays per year
Flexible spending account
Health savings account (available to High Deductible Health Plan participants only)
Employee Assistance Program
Educational Assistance Program
Voluntary benefits, such as Critical Illness, Hospital Indemnity, Pet Insurance and Accident Insurance
Title insurance policies and certain escrow services for the employee's primary personal residence at no charge
Transportation benefit plan for mass transit, parking and vanpool, in several markets
Note: If you currently are employed by Old Republic Title (or one of its wholly owned affiliated companies) please get in touch with your human resources representative regarding the application process.
For California applicants, please click the following link to view our CCPA Applicant Notice
Old Republic Title is an Equal Opportunity Employer
Auto-ApplySr Cloud Security Analyst (onsite)
Doral, FL jobs
13804 - Sr Cloud Security Analyst (onsite) - Doral, FL Work Setting: Hybrid Required: • Availability to work at the Client's site in Doral, FL (required); • Experience with O365, AD, MS, Linux Access management (5+ years); • Experience with Cloud Security (5+ years);
• Experience with Azure administration and configure access controls;
• Experience with AWS security administration and configure access controls;
• Experience with GCP;
• Experience with GDPR, PCI, NIST;
• Experience with Vendor technology legacy;
• Experience with SailPoint IAM solution;
• Experience with Active Directory;
• Experience with Windows workstations and server operating systems;
• Experience with managing security for AWS cloud environment tenants;
• Security background;
• High School Diploma or GED in Computer Science or other technical degree or equivalent experience;
• Certifications: Microsoft 365 Messaging and or Security Administrator, CompTIA Cloud+.
Preferred:
• Scripting experience (PowerShell, Python etc.);
• Experience with Qualys;
• Experience with Orca Security;
• Bachelor's Degree.
Responsibilities:
• Management, evaluation, maintenance, and enhancement of the cloud security posture;
• Operation of identity and access processes and controls for SailPoint, Active Directory, Email, and Collaboration Platforms and cloud-based solution;
• Continuous improvement of the brand vulnerability management people, process, and technology analyzing cloud environment reporting, prioritizing, and working with brand IT to make Cloud Security Management data actionable and understandable;
• Evaluation and providing directives and guidance regarding our SIEM integrations, identifying potential blind spots, and assisting with configuration validations;
• Augment and assist GISCS Security Operations, monitoring and triaging brand security events (Security Operations);
• Creates visual information in the form of dashboard(s) and reports for executives and business stakeholders on a regular basis that communicates Cybersecurity risks and KRIs;
• Assisting with security architecture reviews for new and proposed integrated solutions.
Why apply?
• Work with one of the largest global vacation and cruise providers and a recognizable brand;
• Be a part of a diverse multicultural team and thrive in a fun and inclusive work environment dedicated to providing memorable and affordable vacations;
• Work with the leader in cutting-edge technology and programming;
• Be certain in your future as our Client is a stable and growing company with increasing revenue;
• Receive plenty of coaching and support from the team and current Vitaver consultants.
Enjoy a comprehensive employee benefits program:
• Get paid on a bi-weekly basis;
• During the 1st year of employment - prorated amount of PTO and Sick Time. After - 14 days of PTO annually and 10 days of sick time annually;
• Eight paid holidays annually;
• Available health, dental, vision plans;
• Flexible spending account;
• 401K retirement savings plan;
• Employee Stock Purchase plan;
• Short and long-term disability plan;
• Cruise benefits;
• Discount and complimentary memberships (various complimentary memberships, discount cards and passes: theme parks, various restaurants, wholesale clubs, car rental agencies and cell phone providers to name a few).
Onsite perks:
• Fitness center;
• Child Development Center;
• Café and coffee shop;
• Learning Resource Center (LRC);
• Discounted dry-cleaning service;
• Fuel service & car wash.