Requisition ID: 220496 Join a purpose driven winning team, committed to results, in an inclusive and high-performing culture. In this pivotal role, you'll spearhead our second line of defense, overseeing and monitoring cloud security
The primary objective of the SOC Manager is to manage SOC operations for our external clients, in transition of service and/or in the run-phase of the service. This role is responsible to drive the day-to-day SOC operations to defend c[...]
Manage and triage incoming SSDLC requests and tickets to ensure timely resolution and tracking. Collaborate with Technology stakeholders, Architecture review teams to integrate security requirements into application design and become a[...]
Other locations
Along with a competitive base salary and variable pay opportunities, we offer a wide array of initiatives that differentiate us as a people-first organization. On top of our regular paid vacation days, some examples include: $4,000 per[...]
corporate-wide technology security program that balances the need to protect the business with the need to run the business, and aligns with industry best practices. The Branch provides technology security expertise, ensures the identi[...]
you will: Design, implement, and launch high-quality software systems that solve complex problems and have a significant impact Leverage a wide range of AWS technologies to build full-stack web applications, distributed systems, and au[...]
Job SummaryJob DescriptionWhat is the opportunity?Senior Director, End User Provisioning Services will lead an enterprise-wide provisioning operations across Active Directory, Unix and Mainframe. This role will oversee a global team and drive
In this role, you will play a key part in developing, maintaining, and optimizing dashboards and reporting tools to support IT risk analysis and decision-making. This position provides the chance to collaborate with stakeholders, lever[...]
Job SummaryJob DescriptionWhat is the opportunity?As a IAM Director you will manage the day-to-day operations and effectiveness of security-related programs and initiatives; assesses the costs associated with potential threats and solu[...]
Collaborate with internal and external partners to ensure information sharing and support complementary and contrasting risk oversight initiatives as appropriate Establish and maintain effective relationships with all key stakeholders [...]