Description: Be part of a team that unleashes the power of leading-edge technologies to help improve the health and well-being of those most vulnerable in our country and communities. Working at Gainwell carries its rewards. You'll have an incredible ...
29 days ago
... Cyber Security Compliance AuditorLocation: Austin, TexasDuration: Long term Cybersecurity frameworks and compliance: ... data protection laws, regulatory compliance, and third-party risk ... Strong ability to evaluate security controls such as network protection ...
15 days ago
Description: Hi Position: Cyber Security & Compliance Auditor Location: Austin, Texas Duration ... Long term Cybersecurity frameworks and compliance: Proven experience auditing controls against ... data protection laws, regulatory compliance, and third-party risk ...
25 days ago
... current data protection laws, regulatory compliance, and third-party risk management ... : Strong ability to evaluate security controls such as network protection ... , identity access management, endpoint security, and incident response across modern ...
28 days ago
... Sr. Cybersecurity Auditor (Vendor Risk & Compliance) Duration: 6+ Months Location: Austin, TX ... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate ... analyze evidence such as security policies, system configurati
24 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ... with vendor personnel to assess security practices and gover
17 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ...
25 days ago
... Title: IT Auditor With Cyber Security Duration: 6 Months Location: Austin, ... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ...
28 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ...
24 days ago
... Description As a member of the Security and Identity team, you will ... . It is fundamental to OCI's security posture and is a highly scalable ... the 60+ regions worldwide. As a Principal Software Developer, you will work ...
25 days ago
... -party vendors for compliance with contractual, regulatory, and industry security standards. The ... vendor contracts, SLAs, and security requirements for compliance. Audit technical and administ
28 days ago
... 5 years of Cybersecurity frameworks and compliance: Proven experience auditing controls against ... current data protection laws, regulatory compliance, and third-party risk ... auditing: Strong ability to evaluate security controls such as network protection ...
24 days ago
... Skills: 5 Years - Cybersecurity frameworks and compliance: Proven experience auditing controls against ... current data protection laws, regulatory compliance, and third-party risk ... : Strong ability to evaluate security controls such as network protection ...
25 days ago
... and Telework Cybersecurity frameworks and compliance: Proven experience auditing controls against ... current data protection laws, regulatory compliance, and third-party risk ... auditing: Strong ability to evaluate security controls such as network protection ...
28 days ago
... and manage vendor security risk, including:Contract and Compliance Review: Review vendor ... adherence to all contractual obligations.Security Control Evaluation: Evaluate the design ...
15 days ago
... to assess and ensure the security and compliance of our third-party ... obligations related to IT and security standards. This is a critical position ...
18 days ago
Description: Cyber security IT Auditor Location: Austin, Texas ... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate the ... and analyze evidence such as security policies, system configurations, logs, and ...
22 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance. Perform ...
23 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance. Perform ...
24 days ago
... cybersecurity contractual requirements to confirm compliance with contractual obligations.Evaluate the ... and analyze evidence such as security policies, system configurations, logs, ... with vendor personnel to assess security practices and governance.Perform ...
24 days ago