Cybersecurity SIEM -Senior Consultant – Location OPEN at EY
At EY, you’ll have the chance to build a career as unique as you are, with the global scale, support, inclusive culture and technology to become the best version of you. And we’re counting on your unique voice and perspective to help EY become even better, too. Join us and build an exceptional experience for yourself, and a better working world for all.
• *US – Cybersecurity SIEM -Senior Consultant**
Cyber threats, massive data storage, privacy requirements and business continuity require heavy information security measures. In the face of ever-evolving Cyber Security threats, EY’s Cyber Security Event and Incident Management (SIEM) team builds tools and custom integrations in order to mitigate threats to Security Operations. As a member of our SecOps and Infrastructure Protection team, you’ll use your technical and business skills to help us drive this mission and have an impact on cybersecurity at a global level.
• *The opportunity**
As a Cybersecurity SIEM Engineer, you will lead the design and implementation of security incident and event management solutions for our clients. You’ll play a key role in supporting our clients with their most complex information security needs, contributing toward their business resilience, and protecting critical infrastructure.
We will support you with career-long training and coaching to develop your skills. As EY is a global leading service provider in this space, you will be working with the best of the best in a collaborative environment. So, whenever you join, however long you stay, the exceptional EY experience lasts a lifetime.
• *Your key responsibilities**
Our security professionals possess diverse industry knowledge, along with unique technical expertise and specialized skills. You’ll work alongside respected industry professionals, learning about and using the latest tools and techniques to identify and overcome some of the most relevant and pressing security issues in the world. ?
As a Senior Consultant, you will serve on client engagement teams to assist in delivering the full range of services and work with EY Cybersecurity leadership to further develop our security event and incident management service offering.
• *Skills and attributes for success**
+ Possess a proven understanding of SIEM technologies, e.g. Splunk, Azure Sentinel, McAfee, QRadar, LogRhythm, SolarWinds, ArcSight, Fortinet, Elastic, SumoLogic, Rapid7
+ Experience creating and fine-tuning SIEM content such as correlation rules, reports, dashboards, filters, channels, and integrating threat intelligence to improve accuracy and visibility to potential threats and alerts.
+ Monitoring and managing the health and performance of SIEM platform
+ Onboarding log sources and data sources, developing new and custom parses, and designing SIEM architecture reviews
+ Creating use cases and correlations alerts in the SIEM for continuous security monitoring
+ Security Operations experience with operating systems, or cloud infrastructures and services (Azure/AWS)
+ Participating in client meetings to further optimize their specific operational plan based on our best practices and operational learnings
+ Conveying complex technical security concepts to technical and non-technical audiences including executives.
• *To qualify for the role, you must have**
+ A bachelor’s degree in a related field and approximately 3-5 years of related work experience; or a graduate degree and approximately 2 years of related work experience
+ Hands-on experience with common security monitoring technologies including Security Incident Event Management systems (SIEM), Intrusion Detection Systems (IDS), Endpoint Detection & Responses (EDR), Anti-Virus log collection systems for purpose of comprehensive log analysis
+ Experience supporting, troubleshooting, and administering a variety of networks, operating systems (OSs), and applications
+ Experience with one or more of the following Cybersecurity tools: Splunk ES, Azure Sentinel, FireEye, Tanium, ZScaler, Palo Alto, McAfee, Carbon Black, CrowdStrike, Prisma Cloud, Humio, or ServiceNow SecOps
+ Experience in process reengineering, workflow design, process improvement, or process mapping.
+ Ability to travel as needed for client-site visits, team on-sites and strategic planning sessions; a driver’s license valid in the U.S
• *Ideally, you’ll also have**
+ Excellent analytical and problem-solving abilities
+ Strong presentation and communication skills
+ Knowledge of concepts and solutions of security services in the Zero-Trust model
+ Knowledge of Azure Sentinel, Azure Log Analytics, Microsoft Flow, or Power BI
+ Relevant security certifications (e.g., Splunk ES, CEH, CISSP)
• *What we look for**
We’re interested in intellectually curious people with a genuine passion for cyber security. With your specialization in **Security incident and event management** , we’ll turn to you to speak up with innovative new ideas that could make a lasting difference not only to us – but also to the industry. If you have the confidence in both your presentation and technical abilities to grow into a leading expert here, this is the role for you.
• *What we offer**
We offer a competitive compensation package where you’ll be rewarded based on your performance and recognized for the value you bring to our business. In addition, our Total Rewards package includes medical and dental coverage, pension and 401(k) plans, and a wide range of paid time off options. Under our flexible vacation policy, you’ll decide how much vacation time you need based on your own personal circumstances. You’ll also be granted time off for designated EY Paid Holidays, Winter/Summer breaks, Personal/Family Care, and other leaves of absence when needed to support your physical, financial, and emotional well-being.
+ **Continuous learning:** You’ll develop the mindset and skills to navigate whatever comes next.
+ **Success as defined by you:** We’ll provide the tools and flexibility, so you can make a meaningful impact, your way.
+ **Transformative leadership:** We’ll give you the insights, coaching and confidence to be the leader the world needs.
+ **Diverse and inclusive culture:** You’ll be embraced for who you are and empowered to use your voice to help others find theirs.
• *If you can demonstrate that you meet the criteria above, please contact us as soon as possible.**
• *The exceptional EY experience. It’s yours to build.**
• *EY | Building a better working world**
EY exists to build a better working world, helping to create long-term value for clients, people and society and build trust in the capital markets.
Enabled by data and technology, diverse EY teams in over 150 countries provide trust through assurance and help clients grow, transform and operate.
Working across assurance, consulting, law, strategy, tax and transactions, EY teams ask better questions to find new answers for the complex issues facing our world today.
EY is an equal opportunity, affirmative action employer providing equal employment opportunities to applicants and employees without regard to race, color, religion, age, sex, sexual orientation, gender identity/expression, national origin, protected veteran status, disability status, or any other legally protected basis, including arrest and conviction records, in accordance with applicable law.
EY is committed to providing reasonable accommodation to individuals with disabilities. If you are a qualified individual with a disability and either need assistance applying online or need to request an accommodation during the interview process, please call 1-800-EY-HELP3, type Option 2 (HR-related inquiries) and then type Option 1 (HR Shared Services Center), which will route you to EY’s Talent Shared Services Team or email SSC Customer Support at [Email available when viewing the job] .
For Remote Cybersecurity SIEM -Senior Consultant – Location OPEN roles, visit Remote Cybersecurity SIEM -Senior Consultant – Location OPEN Roles
Senior Lead Cyber Security Research Consultant at Wells Fargo
About This Role
Wells Fargo is seeking a Senior Lead Cyber Security Research Consultant
to join our Threat Detection Services (TDS) team to support the Incident Response and Cyber Threat Hunt teams. The role will be responsible for providing senior subject matter expertise in Incident Response and Threat Hunting; senior-level incident handling; mentoring less experienced team members; partnering with multiple team managers on enterprise initiatives; and, leading existing strategic level programs and executive reporting. This position will report to the Threat Detection Services Senior Manager, and directly interact with team members from Threat Detection Services, Security Content Development, Cyber Threat Fusion Center, Offensive Security Research Team, and Cyber Threat Intelligence teams, and including internal partners such as legal, fraud, financial crimes, technology and line of business leaders and executives. Requires regular interface with external entities including law enforcement, intelligence, financial industry contacts and government organizations and agencies.
The role of the Senior Lead Cyber Security Research Consultant is to identify opportunities to enhance cyber security defenses and reduce risk to the corporation, create and execute strategic business plans, and lead new initiatives to incorporate, expand, and maintain inter-team engagement strategies and liaison within and external to Wells Fargo Technology. The role will also be responsible for identifying, evaluating, and implementing new technology and team requirements as defined by evolving industry best practices. The role is also the senior technical subject matter expert for Incident Response and Cyber Threat Hunt team members.
In This Role, You Will
• Apply advanced data analysis techniques, including machine learning, statistics and data mining to solve core business challenges, capture cyber security requirements and translate them into solutions
• Build prototypes and proof of concepts, pilot systems, and optimize databases in support of program operational, business, and strategic requirements development process
• Conduct research and identify technologies to address capability gaps for emerging cyber threats, attack methods and evolving tactics, techniques, and procedures
• Integrate new architectural analysis of cyber security features and relate existing system to future needs and trends
• Embed advanced forensic tools and techniques for attack reconstruction, and provide engineering recommendations
• Provide oversight and guidance to a team in responding to and resolving critical cyber security events and consult leadership with the decisions related to business process, security controls, policies and standards, regulations and investment prioritization
• Set the strategy and direction for advanced cyber security incident response and threat detection for the company
• Collaborate and influence all levels of professionals including managers
• Lead team to achieve objectives
Required Qualifications, US:
• 7+ years of Cyber Security Research experience, or equivalent demonstrated through one or a combination of the following: work experience, training, military experience, education
• 7+ years of cyber security incidents and events investigation experience
• 5+ years of experience working with multiple security domains (network, application security, threat intelligence and data analytics)
• 5 + years of experience with sophisticated cyber threat actor Tactics, Techniques, Procedures (TTPs) intelligence
• 7+ years of information security experience including experience in one or more of the following security disciplines: information security monitoring, incident response, vulnerability management, host/network forensics, cyber-crime investigation, penetration testing, business continuity, or cyber threat intelligence
• Certifications in one or more of the following: Global Information Assurance Certification (GIAC), Offensive Security Certified Professional (DQO0012775) (OSCP), Offensive Security Wireless Professional (OSWP), Offensive Security Certified Expert (OSCE), Offensive Security Exploitation Expert (OSEE), or Offensive Security Web Expert (OSWE)
• Certifications in one or more of the following: Certified Information Systems Security Professional (CISSP), Global Certified Incident Handler (GCIH), Reverse Engineering Malware (GREM), Global Certified Forensic Analyst (GCFA), Global Network Forensics Analyst (GNFA), Offensive Security Certified Professional (OSCP) Offensive Security Certified Expert (OSCE) or other relevant certifications
• Strong investigative mindset with an attention to detail
• Advanced problem solving skills, ability to develop effective long-term solutions to complex problems
• Ability to manage complex security scenarios and develop innovative solutions to address the most recent cyber threats
• Expert knowledge and understanding of information security practices and policies, including Information Security Frameworks, Standards, and best practices
• Ability to manage highly complex issues and negotiate solutions
• Experience explaining complex technical items to senior level audiences
• Ability to travel up to 10% of the time
We Value Diversity
At Wells Fargo, we believe in diversity, equity and inclusion in the workplace; accordingly, we welcome applications for employment from all qualified candidates, regardless of race, color, gender, national origin, religion, age, sexual orientation, gender identity, gender expression, genetic information, individuals with disabilities, pregnancy, marital status, status as a protected veteran or any other status protected by applicable law.
Employees support our focus on building strong customer relationships balanced with a strong risk mitigating and compliance-driven culture which firmly establishes those disciplines as critical to the success of our customers and company. They are accountable for execution of all applicable risk programs (Credit, Market, Financial Crimes, Operational, Regulatory Compliance), which includes effectively following and adhering to applicable Wells Fargo policies and procedures, appropriately fulfilling risk and compliance obligations, timely and effective escalation and remediation of issues, and making sound risk decisions. There is emphasis on proactive monitoring, governance, risk identification and escalation, as well as making sound risk decisions commensurate with the business unit’s risk appetite and all risk and compliance program requirements.
Candidates applying to job openings posted in US: All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or status as a protected veteran.
Candidates applying to job openings posted in Canada: Applications for employment are encouraged from all qualified candidates, including women, persons with disabilities, aboriginal peoples and visible minorities. Accommodation for applicants with disabilities is available upon request in connection with the recruitment process.
For Remote Senior Lead Cyber Security Research Consultant roles, visit Remote Senior Lead Cyber Security Research Consultant Roles
DevSecOps Security Technical Analyst (Secret, preferred) – 100% Remote in USA at General Dynamics Information Technology
Type of Requisition: Regular
Clearance Level Must Be Able to Obtain: Secret
Public Trust/Other Required: NACLC (T3)
Job Family: Cyber Security Technical Analysis
We are GDIT. We stay at the forefront of innovation to solve complex technical challenges. General Dynamics Information Technology is seeking a DevOpsSec Security Technical Analyst with Cloud experience.
The position will support a US Air Force program that is playing a major role in strengthening and modernizing America’s Strategic Deterrent Force. GDIT will develop and deliver a digital engineering design solution that enables and integrates the program’s complete set of data, tools, and model-based systems engineering (MBSE) activities, and makes them available to internal and appropriate external engineering and programmatic stakeholders throughout the program’s lifecycle.
This effort will culminate in an abstracted, highly transportable environment delivered to the Government, to be instantiated “virtually” on the Government’s network infrastructure, and updated during the Engineering and Manufacturing Development (EMD) phase of weapon system development.
For this effort, GDIT will use cloud based concepts including IaaS (Infrastructure as a Service); PaaS (Platform as a Service); and SaaS (Software as a service) and containerization concepts including Terraform and Docker to buildout the DEE. Together, the application of these concepts will result in a Software-Defined Data Center (SDDC).
MAJOR RESPONSIBLITIES AND DUTIES :
+ Working daily with Development teams to integrate dependencies and backend components via automated pipelines
+ Educating teams on adoption of DevSecOps Security practices and tooling, and supporting those practices and tools
+ Creating, managing, and maintaining Pipelines, Data Integrations, and Infrastructure as Code (IaC) for our CI/CD pipelines and associated project-based deployments
+ Assisting teams with DevSecOps issues related to performance, configuration, or otherwise
+ Identifying and implementing improvements to how we securely build, deploy and monitor software projects
+ Helping create cloud infrastructure in a cost-efficient manner
REQUIRED EXPERIENCE/SKILLS :
+ US Citizen
+ BA/BS Degree (or equivalent experience)
+ 2+ years of Security/DevOps/Cloud (AWS) experience
+ Experience with Kubernetes
+ Experience with PKI, mTLS
+ Experience with Security Scanning Tools: Anchore, OSCAP, Twistlock (preferred tools)
+ Experience with creating software packages for RMF approval
+ Experience with Static Code Quality Scanning Tools: SonarQube (preferred tools)
+ Experience patching containers and operating systems for vulnerabilities – CVEs and Compliance
+ Experience with Software Engineering and Continuous Delivery and/or DevOps related practices
+ Experience with Git version control
+ Experience with Docker, containerization build technologies, and container registries
+ Experience with Gitlab and GitLab CI/CD Pipelines
+ Experience with Ansible or shell scripting
+ Experience using Linux/Unix (CentOS or RedHat preferred)
+ Must be detail oriented, critical thinker, possess excellent problem-solving skills
+ Desire for continuous improvement and a commitment to best practices
+ Possess effective communication skills, especially in a team setting
+ Familiarity with government standards for security, identity, and data management, such as NIST
+ Performs assessments of systems and networks within the network environment or enclave. Plans, prepares, and executes tests of systems to evaluate results against specifications and requirements, and measures effectiveness of defense-in-depth architecture against known vulnerabilities.
+ Security+ Certification
+ Active DoD Secret Clearance
DESIRED EXPERIENCE/SKILLS :
+ Experience with Nexus, Packer, Container Registries, and Ansible
+ Knowledge of secure development practices
+ Kubernetes Policy Enforcement and Security
+ Stays current with related technology and practices
+ Ability to handle a dynamic work environment
+ Effective organization and time management skills
+ Desire for continuous learning
+ Ability to secure and maintain a SECRET security clearance
+ Possible travel approximately less than 20%
+ Travel to and from a secured environment or program meeting may be needed
+ Remote 100% within USA
WHAT GDIT CAN OFFER YOU:
+ Full-flex work week
+ 401K with company match
+ Internal mobility team dedicated to helping you own your career
+ Collaborative teams of highly motivated critical thinkers and innovators
+ Ability to make a real impact on the world around you
\#DEE2020 #kmp #Defense #USAF #cjobs #dicepost #gdpost #cloud #cybersecurity #sranalyst #systemsadvisor #virginia #AFOpportunities \#DEEOPEN8022022 \#gditcareers #DEEjobs
COVID-19 Vaccination: GDIT does not have a vaccination mandate applicable to all employees. To protect the health and safety of its employees and to comply with customer requirements, however, GDIT may require employees in certain positions to be fully vaccinated against COVID-19. Vaccination requirements will depend on the status of the federal contractor mandate and customer site requirements.
We are GDIT. The people supporting some of the most complex government, defense, and intelligence projects across the country. We deliver. Bringing the expertise needed to understand and advance critical missions. We transform. Shifting the ways clients invest in, integrate, and innovate technology solutions. We ensure today is safe and tomorrow is smarter. We are there. On the ground, beside our clients, in the lab, and everywhere in between. Offering the technology transformations, strategy, and mission services needed to get the job done.
GDIT is an Equal Opportunity/Affirmative Action employer. All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, disability, or veteran status, or any other protected class.
For Remote DevSecOps Security Technical Analyst (Secret, preferred) – 100% Remote in USA roles, visit Remote DevSecOps Security Technical Analyst (Secret, preferred) – 100% Remote in USA Roles
Lead Risk & Compliance Analyst at Deloitte
Are you passionate about technology and interested in joining a community of collaborative colleagues who respectfully and courageously seek to challenge the status quo? If so, read on to learn more about an exciting opportunity with Deloitte’s Information Technology Services (ITS). We are curious and life-long learners focused on technology and innovation.
Work you will do
This role supports audits and assessment programs of the Technology Cyber Security Risk & Compliance team which includes risk management, audits, and assessments for on premises as well as cloud hosted IT applications and infrastructure. This position is specifically responsible for helping drive SOC 1 and SOC 2 audits and manage the day-to-day responsibilities of gathering evidence, scheduling resources, coordinating with business owners and external auditors, and identifying potential audit issues/operational improvements. Role is to also have an understanding of and ability to assess technology and operational risks related to internal and cloud technology solutions and at times, provide input to ITS personnel on appropriate controls to address audit risks. The position will also work with external and internal auditors, serving as liaison between ITS and non-ITS auditees, gathering and presenting evidence as required.
Key Tasks / Essential Job Functions:
+ Understand technology controls: testing of controls, supporting evidence, that impact on premises and cloud technology, operational risk to the Information Technology Services organization as well as related laws, regulations, and industry standards, specifically related to internal and cloud technology solutions.
+ Assist and recommend policies, standards, procedures, and controls to assure the confidentiality, integrity, and availability of the information technology environment for on premises as well as cloud hosted IT applications and infrastructure.
+ Represent Information Technology related to internal and external assessments and/or audits of information technology systems and processes, interpret results, and develop and communication recommendations to management.
+ Participate in appropriate opportunities for continuing education, seminars, and participation in field-related professional organizations to remain current on developments in information security profession.
+ Develop and recommend appropriate information security policies, standards, procedures, checklists, and guidelines using generally recognized security concepts tailored to meet the requirements of the organization for on premises as well as cloud hosted IT applications and infrastructure.
+ Identify and document specific security issues, propose resolution options, and interpret matters from the perspective of involved stakeholders.
+ Other duties as assigned
Information Technology Services (ITS) helps power Deloitte’s success. ITS is the engine that helps to drive Deloitte, which serves many of the world’s largest organizations. We develop and deploy cutting-edge internal and go-to-market solutions that help Deloitte operate effectively and lead in the market. Our reputation is built on a tradition of delivering with excellence.
The ~3,000 professionals in ITS deliver services internally including:
+ Cyber security
+ Technology support
+ Technology & Infrastructure
+ Application development and management
+ Relationship management group
+ Bachelor’s degree in Computer Science, Business Administration, Information Systems, Accounting or equivalent educational or professional experience and/or qualifications.
+ Minimum 8 years of directly related experience (or 5 years with advanced degree) in the following: managing information technology audits, assessments, and remediation management.
+ Minimum 2 years of experience with various industry standard frameworks such as: SSAE 18, SOC 1 and SOC 2, Shared Assessment Program Agreed Upon Procedures, HIPAA, HITRUST, CSA, CCM.
+ Industry certification (e.g., CPA, CISA, CISSP, CISM etc.)
+ Experience leading IT internal audit, external audits, and or service organization control reporting and activities
+ Solid understanding of IT general controls and activities
+ Familiarity with privacy laws, data protection/security regulations, and cloud security frameworks
+ Possess a general understanding of IT security technologies, including network, application and database security, access management and cloud security
+ Consulting skills (client service orientation, conflict resolution, analysis/synthesis of information, negotiation, project management, etc.) (preferred)
+ Excellent communication, listening, and facilitation skills (preferred)
+ Excellent time management and related organizational skills, including appropriate sense of urgency, a proactive approach, and a suitable ability to anticipate and manage project lifecycle events, issues, and obstacles (preferred)
+ Very good understanding and experience with cloud technologies and security controls (preferred)
+ Must be legally authorized to work in the United States without the need for employer sponsorship, now or at any time in the future
For individuals assigned and/or hired to work in Colorado or Nevada, Deloitte is required by law to include a reasonable estimate of the compensation range for this role. This compensation range is specific to the State of Colorado and the State of Nevada and takes into account the wide range of factors that are considered in making compensation decisions including but not limited to skill sets; experience and training; licensure and certifications; and other business and organizational needs. The disclosed range estimate has not been adjusted for the applicable geographic differential associated with the location at which the position may be filled. At Deloitte, it is not typical for an individual to be hired at or near the top of the range for their role and compensation decisions are dependent on the facts and circumstances of each case. A reasonable estimate of the current range is $86,425 to $159,165.
You may also be eligible to participate in a discretionary annual incentive program, subject to the rules governing the program, whereby an award, if any, depends on various factors, including, without limitation, individual and organizational performance.
FY23 US_Cyber Security_94
All qualified applicants will receive consideration for employment without regard to race, color, religion, sex, sexual orientation, gender identity, national origin, age, disability or protected veteran status, or any other legally protected basis, in accordance with applicable law.
For Remote Lead Risk & Compliance Analyst roles, visit Remote Lead Risk & Compliance Analyst Roles
Data Security Specialist at Point B
Management Consulting has been the foundation of Point B’s employee-owned company for 25+ years. Our collaborative, forward looking leadership approach ensures our customers are on the right path to success.
What makes Point B different? An employee-ownership model that gives you a voice in directing your career and building our company. Diverse leadership opportunities to expand your skills, along with the support needed to deliver great results. A unique culture that recognizes the importance of flexibility and collaboration.
Point B has been consistently recognized as one of the best places to work by Fortune® magazine, The Wall Street Journal, Consulting® magazine, Vault.com® and many others.
The Data Security Specialist is a client-facing role situated at the forefront of our Cyber Security strategy and digital transformation efforts. Reporting to the Cybersecurity Practice Leader, the Data Security Specialist plays a critical role in helping evaluate, govern, design, strategize and advise clients to align their Data Security priorities, working with them to deliver and implement new solutions to everyday Security concerns.
What You’ll Get To Do
Advise on customer engagements centered around data security, data governance, data management, project management and endpoint (Data Loss Prevention) protection. This is an emergent role where you will contribute to the development and growth of the Cyber Security and Solutions practice. You will have growth opportunity through development of service offering, partnership with external business and training/upskill opportunities.
Partner with appropriate Client business stakeholders to plan, implement and support foundational data security requirements and their respective software/technology
POV creation, vendor alignment strategies and operational efficiency reviews, providing guidance as Subject Matter Expert in the Data Security domain
Deliver client specific Data Security consulting and support, serving as a trusted partner
Development of standards, procedures, and guidelines
Advise and implement Data Security best practices and frameworks
Work closely with business stakeholders and product owners to identify business requirements and translate to design solutions
Collaborate with peer engagement leads to define and establish best-in-class, effective, and consistent engagement practices
What We Offer
A unique opportunity to build and mature the Data Security practice. You will have the exciting opportunity to contribute to growth strategy and move into diversified, senior roles. We welcome proactive leadership and provide a place for growth mindsets to flourish. We believe in each member of our team loving their job and being excited to come to work every day.
THE KIND OF PEOPLE WE LOOK FOR: Conceptual and logical thinkers, independent starters, engaged leaders, versatile consultants that love a challenge, big thinkers, highly organized professionals that can work multiple projects simultaneously, problem solvers who loves growth, collaboration, and embodies a client first mentality.
What We Expect You’ve Already Done
Bachelor’s Degree in related field
1-3+ years IT Consulting or equivalent experience
1-3+ years’ experience implementing key elements of Data Security / Data Loss Prevention (DLP)
1-3+ years’ experience supporting business lines/stakeholders in evaluating and remediating security and risk
Solid and broad technical foundation to include knowledge of Data Loss Prevention (DLP), Data Governance and Data Management
Understanding of DLP features and solutions (centralized management, policy creation)
Knowledge of protecting data in motion, at rest and in use
Understanding of IT standards, procedures, and policies (NIST, ISO27000)
Detail oriented with analytic mindset
Understanding of software development lifecycles
Proven problem-solving skills and ability to work independently
Ability to confidently present analysis to leadership with recommendations and observations
Demonstrated ability to self-direct project outcomes, with minimal supervision to achieve goals
Ability to build consensus and cooperation as well as to influence, interact and negotiate with senior leadership
Strong communication and customer relationship skills (Soft Skills)
Experience with Microsoft Office suite including MS Project and Visio
Industry information security certification (e.g., CISM, CISSP, or related)
Knowledge of international laws and standards (GDPR)
Knowledge of change, project, or agile management methodologies and principles and the ability to integrate them into project design
Leadership/Team Management Skills
Your Office Home Base
Any Point B Office Location
INTRIGUED TO LEARN MORE?
When you apply for this role, your information will be personally reviewed by our talent acquisition team (not by a robot). You can expect to hear back from us with feedback if we think there could be a fit and what next steps look like.
About Point b
Point B is a consulting company dedicated to helping organizations with critical initiatives in the areas of customer engagement, growth investments, workforce experience and operations excellence. Our diverse set of experts spans 13 U.S. locations, with international reach via our partnership with Nextcontinent. We’ve helped global organizations of all stages and sizes achieve sustainable success by focusing on the humans at the center of change.
What makes Point B Different?
Our Founding Purpose and Values of our firm. Be part of a fun and collaborative culture with teams that are as passionate about their communities as they are about their clients
Employee Ownership – Giving you a voice in directing your career and building our firm
Benefits – Our comprehensive package includes competitive base pay and an annual bonus, complete health benefits including an option for 100% employer paid premium for medical, vision and dental coverage for employees, ownership shares through our ESOP, self-directed time off and more
Work-Life Balance – A unique culture that recognizes the importance of flexibility and collaboration. Our local and national model empowers you to choose the life you want
Award winning – We are proud to be named a Best Workplace in the US by Fortune magazine, Best Workplaces for Millennials, and Best Workplaces for Women. Hear more about why people love working at Point B on GlassDoor
We are an equal opportunity employer committed to a diverse workforce. We do not discriminate on the basis of race, religion, color, national origin, gender, gender identity, sexual orientation, age, marital status, veteran status or disability.
For Remote Data Security Specialist roles, visit Remote Data Security Specialist Roles
IT disaster Recovery Analyst at Two95 International Inc.
Position: IT disaster Recovery Analyst – Portland, OR
IT Disaster Recovery Analyst
Contract Rate: $Open
– • Bachelor’s degree with a minimum of 5 years experience with IT technologies, analysis of business process to technology interdependency mapping.
• A combination of a background in IT disaster recovery with business continuity concepts is preferred. Knowledge of principles, procedures, regulations and techniques of business continuity crisis management and disaster response.
• Has worked in a team environment related to the implementation of Business Impact Analysis project and ITDR program work.
• Has extensive experience in performing client engagement work associating technologies with business processes identified through a business impact analysis.
• Demonstrates an accomplished knowledge of Information and Operational Technologies, networks, user facing applications and middleware along with an understanding of physical and virtual systems and their interdependencies.
• Understands information security practices, technologies and infrastructure and has collaborated with information security teams.
• Has conducted detailed risk assessments and impact analysis work on technology interdependencies and developed technical reports that identify gaps and recommendations.
• Understands the relationship between business impact analysis, risk assessments and IT disaster recovery plan development. Has facilitated an IT disaster recovery analysis and development of recovery plans based on business impact analysis information.
• Understands the relationship between business continuity and IT disaster recovery programs and has worked with Business continuity teams to ensure collaboration occurs around plan development (IT/DR and BCP).
• Preferred job skills: A combination of a background in IT disaster recovery with business continuity concepts is preferred.
If interested please send your updated resume to
(url removed) and include your Rate requirement along with
your contact details with a suitable time when we can reach you. If you
know of anyone in your sphere of contacts, who would be a perfect match
for this job then, we would appreciate if you can forward this posting
to them with a copy to us.
Intern – Compliance Analyst- Summer 2023- Nationwide / Remote at Lumen
ABOUT LUMEN Lumen is guided by our belief that humanity is at its best when technology advances the way we live and work. With 450,000 route fiber miles serving customers in more than 60 countries, we deliver the fastest, most secure global platform for applications and data to help businesses, government and communities deliver amazing experiences. Learn more about Lumen’s network, edge cloud, security and communication and collaboration solutions and our purpose to further human progress through technology at news.lumen.com, LinkedIn: /lumentechnologies, Twitter: lumentechco, Facebook: /lumentechnologies, Instagram: lumentechnologies and YouTube: /lumentechnologies. THE ROLE This role is designed to provide hands on experience coordinating and executing a variety of audit processes to ensure compliance with information security policies and standards. The compliance analyst monitors, tests, and coordinates audit and compliance activities related to one or more specific compliance programs/standards and coordinates external audit activities on a periodic basis. This intern will have the opportunity to apply what they have learned in a classroom environment while gaining new skills in a dynamic professional setting. This intern will assist members of the Compliance team with key objectives, initiatives and projects. This role requires critical attention to detail in a fast-paced environment, self-motivation, and resourcefulness to identify potential issues, ask good questions, research and investigate options, and work collaboratively to identify and implement workable solutions. THE MAIN RESPONSIBILITIES Document execution of information security controls and any findings identified during the control validation cycle. Assist with readiness assessment and implementation of PCI DSS 4.0 standard Assist with the implementation of audit and compliance GRC solution Assist with the performance of annual security compliance audit agenda WHAT WE LOOK FOR IN A CANDIDATE Education Requirements Enrolled at a 4-year accredited college or university, rising senior or master’s level education status at the start of the internship, graduating August 2023 – May 2024 Major/Degree: In pursuit of a Bachelor’s or Master’s degree in cyber security or related field Proficiency and understanding of: – Proficient in MS Office (Word, Excel, Outlook) Professional Attributes Intellectual curiosity and the desire to learn and apply understandings to effect sound design of sound procedures Ability to work independently, work in a team environment, prioritize and meet deadlines Maintain professionalism and confidentiality as required. Highly organized Strong written and verbal communication skills Ability to interact with business partners and drive the conversation. Flexible and adapts well to change Analytical and critical thinker Problem solving and decision-making skills Work Setting Fully remote/ work from home. Intern must be able to work 30-40 hours be week during the 10-week program (June – August) US work authorization WHAT TO EXPECT NEXT After completion and submission of your application, you will be asked to participate in a virtual video interview. This on demand interview will be a way for Lumen to learn more about you and your experience as it aligns to the internship position. A separate email invitation will be sent to you (check your spam) within 6 hours of application. For continued consideration in the summer internship program, please ensure you complete the video interview within 5 business days of application. Thank you Requisition : 316851 When applying for a position, you may be subject to a background screen (criminal records check, motor vehicle report, and/or drug screen), depending on the requirements for the position. Job-related concerns noted in the background screen may disqualify you from the new position or your current role. Background results will be evaluated on a case-by-case basis. EEO STATEMENT We are committed to providing equal employment opportunities to all persons regardless of race, color, ancestry, citizenship, national origin, religion, veteran status, disability, genetic characteristic or information, age, gender, sexual orientation, gender identity, marital status, family status, pregnancy, or other legally protected status (collectively, “protected statuses”). We do not tolerate unlawful discrimination in any employment decisions, including recruiting, hiring, compensation, promotion, benefits, discipline, termination, job assignments or training. NOTE: Pursuant to the San Francisco Fair Chance Ordinance, we will consider for employment qualified applicants with arrest and conviction records. DISCLAIMER The above job definition information has been designed to indicate the general nature and level of work performed by employees within this classification. It is not designed to contain or be interpreted as a comprehensive inventory of all duties, responsibilities, and qualifications required of employees assigned to this job. Job duties and responsibilities are subject to change based on changing business needs and conditions.
For Remote Intern – Compliance Analyst- Summer 2023- Nationwide / Remote roles, visit Remote Intern – Compliance Analyst- Summer 2023- Nationwide / Remote Roles