Description: Cyber Threat Intelligence Analyst Irving, TX - 5 days onsite ... seeking a Cyber Threat Intelligence Analyst to strengthen our threat intelligence ... ability to drive intelligence-led security outcomes. ResponsibilitiesAdvance the threat ...
14 days ago
$48
$51
an hour
... is seeking a Cyber Threat Intelligence Analyst in Irving, TX. Summary: We ... are seeking a Cyber Threat Intelligence Analyst to strengthen our threat intelligence ... align it with business and security objectives. This role fuses internal ...
26 days ago
Description: Position: Senior Business Analyst - Mortgage (12+yrs exp. Needed) ... , Process mapping,Data mappingAPI IntegrationStakeholder management Senior Business Analyst Job Description Roles ...
6 days ago
... Overview: Req ID: 341535 NTT DATA strives to hire exceptional, innovative ... now. NTT DATA's Client is currently seeking a Business Analyst to join their ... States (US).Job Description - Business Analyst Hybrid 1 year project W2 only ...
18 days ago
Description: Computer Systems Analyst W2 requirement Irving TX Key ... organization to enhance compatibility and data sharing. Analyze information processing ne
a day ago
... data from various back-end services and databases. * Security: Ensuring the security of ...
29 days ago
... in such fields as electronic data processing, information systems, systems analysis ... coordinate project activity. Manage backup, security and user help system. Consult ...
14 days ago
... and implementing enterprise data protection capabilities to ensure the security and integrity ... information. You will lead various data protection projects, collaborate with different ...
10 hours ago
... , optimize, and secure our cloud data platform. * The ideal candidate will ... Access Control (RBAC) to ensure data governance and security compliance.Key R
4 days ago
... as Functions, Logic Apps, Data Factory, Data Lake Storage, and Key Vault ... security policies, aligning with Zero Trust principles across identity, applications, and data ...
22 days ago
... as Functions, Logic Apps, Data Factory, Data Lake Storage, and Key Vault ... security policies, aligning with Zero Trust principles across identity, applications, and data ...
26 days ago