- RTX Corporation (Aurora, CO)
- …a safer, more secure world. Raytheon is seeking a well-qualified Senior Principal Cyber Systems Engineer-IPT Lead to join the Cyber Security Engineering team ... for assisting in the development and management of the cyber group and may be required to provide guidance...Guide (ASD STIG), database security, and experience with the Risk Management Framework (RMF) process and artifact development leading… more
- Highmark Health (Denver, CO)
- …staff through solution development + Outstanding judgement and ability to methodically analyze cyber risk , and intelligence and both offer risk appropriate ... Practices and Privacy Policies and Procedures as well as all data security guidelines established within the Company's Handbook of Privacy Policies and… more
- Bank of America (Denver, CO)
- …Risk Analytics + Technology System Assessment + Business Acumen + Business Intelligence + Data Privacy and Protection + Data and Trend Analysis **Position ... of Bank of America's Global Information Security policy and relevant cyber security threats to complete security assessments. Job expectations include developing… more
- Bank of America (Denver, CO)
- …+ Risk Analytics + Quality Assurance + Business Acumen + Stakeholder Management + Data Privacy and Protection + Data and Trend Analysis + Business ... complying of the Bank's Global Information Security policy and relevant cyber security threats to complete security assessments. Job expectations include providing… more
- Amentum (Denver, CO)
- …directed + Lead discussions with various teams, both internal and external, around data compliance and risk efforts + Provide expertise to system administrators, ... **Senior Cybersecurity Analyst** role is a remote-telework position that supports our Risk and Compliance (R&C) arm of the cybersecurity team. This role contributes… more
- Raymond James Financial, Inc. (Denver, CO)
- …intrusion detection systems, and encryption protocols, to safeguard the network against cyber threats. * Continuously learning and keeping up with evolving network ... * Information Security programs including, but not limited to, audit reviews, risk assessment, awareness and training, identity and access management, data … more