- UpvoteDownvoteShare Job
- Suggest Revision
PAM, Privilege Access management, CyberArk, Beyond Trust, Active Directory, IAM, SSO, MFA, SailPoint. The Sr. Information Security Analyst with a focus on Privileged Access Management (PAM) and Identity Access Management (IAM) is a key member of the Information Security department.
Part-timeExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Under the general supervision of the Section Chief (Governance, Risk, Compliance & Data Security), the Senior Information Risk Consultant will provide information risk management and IT security expertise.
Full-timeExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
B2B - If someone comes to them for different purpose Apex will loan shares out ( collateral management , risk management, etc.) Skills:google cloud, Kafaka, IBM, MQ, GoLang, Java, leadership development, Communication, C#, App SupportTop Skills Details:google cloud,Kafaka,IBM,MQ,GoLang,JavaAdditional Skills & Qualifications:Communication Leadership qualities Previous experience working in an Agile Environment is a nice to haveFintech ExperienceExperience Level:Expert Level About TEKsystems: We're partners in transformation.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
Description:Seeking a Compliance Analyst specializing in Audit Management to ensure the organization continues adhere to regulatory requirements and internal policies. Skills:Compliance, Audit, Risk analysis, healthcare, regulatory compliance, investigation and analysis, policy analysis, policy compliance, healthcare compliance, internal audit, legal compliance, corrective action plans, risk compliance.
ExpandApply NowActive JobUpdated Today - UpvoteDownvoteShare Job
- Suggest Revision
The candidate will be responsible to coordinate the Submission of Model Development Documentation to Independent Model Risk Management team. Understanding of regulatory capital and risk management framework and stress testing requirement.
ExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Information Security Analyst - Privileged Access Management (PAM) and Identity Access Management (IAM) The Information Security Analyst with a focus on Privileged Access Management (PAM) and Identity Access Management (IAM) is a key member of the Information Security department.
Full-timeRemoteExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Experience with DoD implementation of the Risk Management Framework (RMF) and governing directives (NIST, CNSS, DSS, etc.) Support IT Security Strategy, Cyber Security, and Compliance and Risk Management supporting IT Security and Compliance Teams.
TemporaryExpandApply NowActive JobUpdated Yesterday - UpvoteDownvoteShare Job
- Suggest Revision
Information security, reporting, third party risk, risk assessment, security policy, cissp, cism, cisa, cyber security, risk management, nist, hipaa, Security controls. Information Security Cyber Risk Analyst performs security risk assessments of third-parties and their solutions to ensure that it meets the information security standards.
Full-timeExpandApply NowActive JobUpdated 12 days ago - UpvoteDownvoteShare Job
- Suggest Revision
5-8 years of experience in Information Technology and/or information technology/cyber security and/or cyber risk management. 5 years of experience with 3 or more of the following areas: Security and risk management, asset security, security architecture and engineering, communications and network security, identity and access management, security assessment and testing, security operations, and software development security.
Full-timeExpandApply NowActive JobUpdated 7 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Satellite, Operation, Cloud, MATLAB, STK, Linux, Matlab Simulink, satellite communication, orbital analysis, Anomaly resolution, telemetry, c2 systems, Clearance, Top Secret, Secret Security Clearance, eMass, certification, accreditation, compliance, inspection, rmf, Risk Management, disa, stig, Information Security, Cyber Security.
Full-timeExpandApply NowActive JobUpdated 15 days ago - UpvoteDownvoteShare Job
- Suggest Revision
This role is highly versatile and technical and requires broad exposure and experience across security and risk management, asset security, security architecture and engineering, communications and network security, identity and access management, security assessment and testing, security operations, and software development security.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Strategy and Major Initiatives are responsible for the planning and delivery of a coherent model risk management framework and infrastructure across GRA. These efforts include the development of one universal platform for seamless model development and implementation, and improvements to the quality and consistency of the data sourced for all development and production purposes.
ExpandApply NowActive JobUpdated 19 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Knowledge of LDAP and Active Directory services, MFA, Risk based authentication and privileged access management. Familiarity with IT security and risk management practices.
Full-timeExpandApply NowActive JobUpdated 14 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Vendor management, contract management, process improvement, performance monitor, risk management. Risk Management: Conduct vendor risk assessments, value analysis, and performance management to support effective decision-making and strategic planning.
RemoteExpandApply NowActive JobUpdated 24 days ago - UpvoteDownvoteShare Job
- Suggest Revision
Ability to build & maintain relationships across various departments such as but not limited to: Capital Management, Corporate Finance, Actuarial, Financial Controls, Risk & Compliance, Company Secretarial, Global Tax, Global Expenses, MI Planning, Data Management, Reinsurance, Internal Audit, and Technical Accounting.
$120,000 a yearFull-timeExpandApply NowActive JobUpdated 24 days ago
management risk jobs Company: Teksystems in CO, Oregon
FEATURED BLOG POSTS
How To Answer “Why Do You Want to Be a Supervisor” in an Interview
Anyone who has worked in a supervisor role knows how challenging yet rewarding it is. But chances are if you're trying to become a supervisor, you'll be forced to answer:
Growing Discontent: Employees Wouldn't Wish Their Jobs on Their Worst Enemy
The start of a new year, and most people are already busy setting personal and professional goals. What’s on the top of the list for a growing number of working people is making an exit from the job they currently have. Why?
How to Professionally Reschedule a Job Interview Without Destroying Your Chances
You’ve practiced answering common interview questions and refined your “greatest weakness.’ Nothing can stop you until BAM! The flu hits your household. Or you ran over a nail and popped a tire en route to the interview. When you need to pivot, there’s a good, better, and best way to reschedule a job interview. Here’s how to do it professionally, so you can nail the gig when the timing is right.
What is a W-9 and How to Fill One Out
When you began working for yourself, you probably didn’t account for the tax reporting work that will fall on your shoulders each year. If you’re a freelancer, independent contractor, or business owner, filing your taxes is not as simple as uploading your W-2 form into some online tax preparation software. Most self-employed people need to complete a W-9 as a step for accurately reporting their earnings to the IRS. Below, you can learn how to fill out a W-9 and when to submit it.
Tightening the HR budget in 2023
With the state of the economy still uncertain, 2023 is expected to be approached with much anticipation. Human Resource leaders have many concerns, including how they will manage to accomplish their goals with budget belts already getting snug. Let’s look at some of the factors that the new year is projected to bring for HR and how to prioritize budgets to reach human capital objectives.
A Comprehensive Guide to Becoming a Better Conversationalist
Have you ever stood awkwardly next to someone at a party because you didn’t know what to say to them? How about at a networking event or on a first date? You're not alone if you’ve ever experienced this uncomfortable silence. Many people struggle to master the art of being a great conversationalist.
Why is Non-Verbal Communication Really Important?
In a world where words and phrases rule daily communication, you may wonder why non-verbal communication is important. Whether you realize it or not, you communicate more with nonverbal actions than you do with verbal communication. When you interact with your peers, people are reading your body language, facial expressions, voice, and many other factors that help fill in blanks that words can't fill.