We are seeking an *Intermediate Technical Analyst / Coordinator, Windows Server *to assist with data collection analysis, application mapping, work packet……
The position is also responsible for compiling and reporting associated metrics and compliance evidence, project support and GRC document preparation, and……
Conduct needs assessment, performs GAP analysis on SuccessFactors, leads business process modeling and helps the business develop “to-be” business processes.…
Must have extensive experience working in a similar role in an IT-related area such as software development, network architecture, data engineering, information……
Develop, implement, update, administer and monitor information management programs, protection policies and procedures for the Board which ensures the creation,……
Perform risk assessments of information systems and infrastructure; develop appropriate risk treatment and mitigation options, and effectively articulate……
Proven experience in project management, application program interfaces, and system implementation. Confirms program operation by conducting tests, modifying……
ADGA s'engage à mettre la diversité en action pour bâtir une équipe plus forte et plus représentative et aider nos clients et nos communautés à prospérer.…
The analyst will work closely with other members of the cyber security team to identify detection opportunities, develop workflows, implement detection……
Develop and implement policies and procedures throughout the software development life cycle. Design, develop and implement information systems business……
The Security Policy Analyst will support the development, maintenance, and evolution of the security policy framework, and work with all security teams to……
Monitor, interpret, and respond to security alerts and notifications for Bell managed customers. Assess and implement mitigation steps for incidents,……
No overdue SCR/PEN test findings without valid exception. Participate in evaluation, risk analysis of security controls, new applications, entitlements,……
Financial contribution for completing eligible certification exams (CISSP, CEH, GSEC, and any other certification deemed relevant to perform your duties).…
Work with cross-functional teams to develop and implement incident response plans, including documenting procedures and conducting training exercises.…
Bachelor’s degree in Computer Science, Cybersecurity, Information Technology, or other related fields, from an accredited university. MBA or master’s degree.…
Experience as a technology security specialist in networking, servers, databases, software development or other technical discipline will be considered an asset……
Contribute to the development of company-wide informationsecurity requirements, threat modeling, secure design, cryptography standards, third-party component,……
Education: Bachelor's degree Experience: 5 years or more Information technology Computer systems analysis/analyst Screening questions Are you currently……
Strides Toronto is a participant in the Government of Canada’s 50-30 Challenge, a program which challenges organizations to improve access for women and/or non……
Participate in the design, development and implementation of security initiatives to ensure the best possible measures are in place to maintain a secure……
We design and develop ZEMA, a sophisticated suite of products that provides clients with robust capabilities for data collection, process automation, and……
Leads development of requirements for local area networks (LANs), wide area networks (WANs), virtual private networks (VPNs), routers, firewalls, and related……
Develop and implement policies and procedures throughout the software development life cycle. Design, develop and implement information systems business……
Today more than 1000 organizations - including over 100 of the Fortune 500 rely on D3 to build, automate and execute incident response plans, connect with third……