... Cyber Security Compliance AuditorLocation: Austin, TexasDuration: Long term Cybersecurity frameworks and compliance: ... data protection laws, regulatory compliance, and third-party risk ... Strong ability to evaluate security controls such as network protection ...
17 days ago
... Sr. Cybersecurity Auditor (Vendor Risk & Compliance) Duration: 6+ Months Location: Austin, TX ... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate ... analyze evidence such as security policies, system configurati
26 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and gover
19 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ...
27 days ago
... 5 years of Cybersecurity frameworks and compliance: Proven experience auditing controls against ... current data protection laws, regulatory compliance, and third-party risk ... auditing: Strong ability to evaluate security controls such as network protection ...
26 days ago
... Skills: 5 Years - Cybersecurity frameworks and compliance: Proven experience auditing controls against ... current data protection laws, regulatory compliance, and third-party risk ... : Strong ability to evaluate security controls such as network protection ...
27 days ago
... and manage vendor security risk, including:Contract and Compliance Review: Review vendor ... adherence to all contractual obligations.Security Control Evaluation: Evaluate the design ...
17 days ago
... to assess and ensure the security and compliance of our third-party ... obligations related to IT and security standards. This is a critical position ...
20 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance. Perform ...
26 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance. Perform ...
27 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and gove
29 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance.Perform ...
29 days ago
... , Artificial Intelligence, Data Analytics and compliance aspects of Cyber Security d
20 days ago
... locations, ensuring data quality, security, and compliance with state and federal policies ...
22 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. * Evaluate the ... and analyze evidence such as security policies, system configur
27 days ago