Collaborates with Strategic Procurement for the sourcing exercise and on-boarding of the third-parties for the execution of cyber assurance activities. Leads the execution of third-party cyber risk assessments (pre and post contacting,[...]
We are passionate about learning and growing as individuals and as a team, all of which enables us to thrive in a dynamic, fast-paced environment. The role will support the manager of DevSecOps within TELUS Health Chief Security Office[...]
Other locations
Join us!Job SummaryThe Specialist Identity and Access Management (IAM) acts as a subject matter expert and provides guidelines on integration of new solutions into the IAM practice and tools. The Specialist IAM will review existing pro[...]
Serves as the primary contact and liaison, and act as a subject matter expert for all Cybersecurity configuration related matters and questions. Implement and maintain configuration management processes and tools. Responsible for defin[...]
Conduct legal assessments of data processing activities; Lead WADA’s privacy management program, including by identifying and managing risk, and developing and maintaining appropriate policies and procedures; Negotiate privacy and da[...]
) Enhance existing processes through innovation and continuous improvement Subject Matter Expertise Drive action across various internal and external stakeholders by communicating technical and process requirements Provide leadership a[...]
Other location
The role of Senior Cyber Security Architect provides advanced knowledge and thought leadership to the Security domain; positioning the role as a highly experienced Cyber Security resource that can apply their knowledge to complex oppor[...]
Lead the design and implementation of Service Management strategies, by collaborating with business stakeholders and cyber security teams to align on Business goals. Establish strong relationships with business stakeholders to get a be[...]
Oversee the development, implementation, and maintenance of the organization's cybersecurity control framework. Lead the design and implementation of innovative security controls to safeguard the organization's systems, networks, and d[...]
Contribute to the development documentation, monitoring and maintenance of information security standards, policies and protocols to ensure organizational infrastructure, data and resources are protected from unauthorized and inappropr[...]