We use cookies to improve the user experience, analyze traffic and display relevant ads.
Details Accept
Enter position

Security Expert Salary in Raleigh, NC

Receive statistics information by mail
Unfortunately, there are no statistics for this request. Try changing your position or region.

Найдите подходящую статистику

Information Security Analyst

Смотреть статистику

Information Security Manager

Смотреть статистику

Information Security Officer

Смотреть статистику

Intelligence Analyst

Смотреть статистику

Lifeguard

Смотреть статистику

Network Security Engineer

Смотреть статистику

Safety Coordinator

Смотреть статистику

Safety Leader

Смотреть статистику

Safety Manager

Смотреть статистику

Safety Officer

Смотреть статистику

Safety Specialist

Смотреть статистику

Security Administrator

Смотреть статистику

Security Analyst

Смотреть статистику

Security Architect

Смотреть статистику

Security Assistant

Смотреть статистику

Security Developer

Смотреть статистику

Security Guard

Смотреть статистику

Security Installer

Смотреть статистику

Security Investigator

Смотреть статистику

Security Manager

Смотреть статистику

Security Officer

Смотреть статистику

Security Specialist

Смотреть статистику

Transportation Security Officer

Смотреть статистику

Unarmed Security Guard

Смотреть статистику

Unarmed Security Officer

Смотреть статистику

USAR Unit Administrator

Смотреть статистику
Show more

Recommended vacancies

Senior Desktop Support - Onsite
msysinc, Raleigh, NC, US
Title: Senior Desktop Support - OnsiteLocation: Raleigh, NC, United StatesLength: Long termRestriction: W2 or C2CDescription:Interview Type: Either Webcam Interview or In Person *** Very long term project initial PO for 1 year, expect to go for 4+ years *** *** Onsite *** Field work within Wake county; mileage will be paidShort Description:This request is for a Desktop Support Specialist to assist Client Services Operations to help support the high number of Service Desk requests, hardware installations, and customer software support required for the Highway Building. **TRAVEL REQUIRED**Job Description:The NCDIT Transportation is seeking an Expert Specialist resource for an engagement to work with the Client Services Team. Client Services uses technical expertise and understanding of business needs to evaluate assigned IT incident and problem service desk tickets to appropriately prioritize and evaluate business impact. Proactively promotes positive customer relationships and mentors others to ensure client satisfaction and organizational success. Takes ownership of customer problems and works with a sense of urgency to resolve incidents and problems. Communicates status of progress to the customer.Provides updates on work progress to Customer Support Specialists and the Service Desk using call tracking system. Has significant technical knowledge and serves as a resource for other technicians to help solve complex problems. Skilled in different types of computer hardware, software, peripherals and components, networking protocols and communications. Installs and images new computers and loads appropriate software for customers. Deploys new business applications as needed. Installs local and network printers and other peripherals and configuration of same. Responsible for user data and migration of profiles as computers are replaced. Stays abreast of current technology in a changing environment. Identifies emerging trends and issues, researches and makes suggestions for technical solutions to solve current and future problems.Uses extensive knowledge to develop and/or implement information technology solutions to enhance organizational success. Works with Data Center Operations with user file server data storage, network reservations, data restores, various account creations and modifications (AD, email, NCID, CITRIX, etc.). Works with application development teams to identify application issues at the customer level and provide technical detail in order for development teams to accurately identify problems within applications. Works with network infrastructure teams to identify network issues at the customer level and provide significant technical detail to assist in network hardware resolutions.Project Management:Ability to lead projects that require directing the work of others and with some latitude on actions or decisions. Leads team efforts and assesses and integrates the skills and strengths of individuals for project and organizational success. Provides status on project work to management.Develop and maintain appropriate documentation for all responsible areas:This position is responsible for creating and maintaining all documentation of process and procedures for all areas this position is responsible for. This documentation is to be used by team members for operational standards of daily work. This documentation will also be used in accordance with Operational Level Agreements (IT internal) and Service Level Agreements (IT external). All documentation should be reviewed annually.System Security:It is the responsibility of all Technical Services Staff to be aware of DOT and ITS security policies, as well as the security issues directly affecting the systems and technology for which this position is directly involved. This position is responsible for implementing requirements of the IT Security Office and protecting data from unauthorized access, alteration, destruction, or usage in a manner inconsistent with covered IT Security Policies and standards.Required Skills:Skilled in different types of computer hardware, software, peripherals and components, networking protocols and communications. 7 YearsInstalling and imaging new computers and loading of appropriate software for customers. 7 YearsInstalling local and network printers and other peripherals and configuration of same. 7 YearsMigrating data and user profiles. 7 YearsDocumenting process and procedures related to technical field support activities. 7 YearsDemonstrates knowledge and a working experience with ServiceNow call tracking system. 7 Years
Remote VMware Architect - Azure Cloud Urgent
tekHouse, Raleigh
12 month plus Contract 1099 or Corp to CorptekHouse, a leading company in IT consulting for the telecommunications industry, is seeking a Remote VMware Architect - Azure Cloud Urgent for immediate hire. The successful candidate will have a proven track record in designing and deploying advanced virtualized infrastructures leveraging the latest VMware and Azure cloud technologies. You will be responsible for analyzing customer requirements, designing, and implementing end-to-end solutions, ensuring excellent performance, security, and reliability. As a remote worker, you will work closely with the tekHouse team to deliver high-quality services that exceed our clients' expectations. tekHouse's IT consulting practice helps CIOs and IT leaders design and implement advanced solutions in IT governance, security, data management, applications, and compliance.RequirementsJob Description:Key Technology requirements: 10 YR EXPERIENCEAzure Cloud VMware Standard Private Cloud solutioning, design and deployment (VCP level resource)Cloud Infrastructure: Virtual Machines, Azure Database, and storage technologies (Storage Accounts, SQL Server, CosmosDB), Virtual Networks, Azure Site Recovery, Traffic Manager, Azure Automation, ARM Templates, Azure Load balancer, API Gateway and Azure ADCloud Management: Policy, RBAC roles, Cost Management, Monitor and Alerting, Site Recovery, Disaster RecoveryOn-premises infrastructure: Active Directory, DNS, VMWare, Hyper-V, firewalls, routingIdentity and user management solutions provided by Azure or 3rd partyFamiliar with Azure DevOps, Visual Studio Team Server (VSTS), Jenkins, Github, Octopus DeployExperience with Automation scripting including PowerShell and other configuration as code toolsDeployment automation languages and tools such as JSON Template, Terraform, AnsibleExperience with Azure and 3rd party monitoring tools and firewall devicesExperience with Windows and Linux-based operating system configuration, automation, and managementExperience with Cloud Security and (SIEM) Security Incident and Event Management Monitoring integrationTechnology Plus:(Ideal candidate similar to below level - but "not required"):Strong Azure design and hands-on experience solutioning with customersAny Microsoft Azure VMware Solution training/certificationMicrosoft Certified - Azure Solutions Architect Expert Exam AZ-305Microsoft Certified - Microsoft Azure Virtual Desktop AZ-140Microsoft Azure Certified - Exam AZ-300: Microsoft Azure Architect TechnologiesMicrosoft Azure Certified - Exam AZ-301: Microsoft Azure Architect DesignMicrosoft Azure Certified - Exam SC-200: Microsoft Security Operations AnalystHands-on Experience with Terraform and/or Bicep but ARM scripting a mustKnowledge and/or experience of Microsoft Azure Synapse, Azure Data Factory and Azure Data LakesKnowledge of Microsoft Partner Funding programs (ECIF, AMPP, PIE, etc...)Experience with AWS and GCP (Nice to Have)
Security Specialist- Expert
Serigor Inc, Raleigh
Job Title: Security Specialist- Expert (Remote)Location: Raleigh, NCDuration: 12+ MonthsJob Description:This supplemental staff position will be working with the Network Security team for the 1st half of 2024. The skills required are on the configuration processes of Cisco ASA & FTD firewalls, Cisco Secure Client 5.x (used to be AnyConnect), Cisco Identity Services Engine (ISE) integration with Cisco Catalyst Center Network Management (used to be DNAC), Cisco Umbrella, Cisco DUO, Infoblox (IPAM), and Firemon firewall management tool. The job is mainly to develop technical documents that will be used by the operations team based on the design from the architecture team, support new security initiatives and CAP (Corrective Action Plan) items.Skills:SkillRequired / DesiredAmountof ExperienceCisco FTD/FMCRequired3YearsCisco ASARequired3YearsCisco Cisco Secure Client (formerly AnyConnect)Required3YearsCisco Identity Services Engine (ISE)Required2YearsCisco UmbrellaRequired2YearsCisco Catalyst Center Network Management (formerly Cisco DNA Center)Required2YearsCisco DUORequired2YearsInfoblox (IPAM)Highly desired2YearsFiremon Firewall Management ToolDesired2Years
IT Security Architect
Beacon Hill Staffing Group, LLC, Raleigh
Location: Fully Remote EST hoursWe are seeking a highly skilled and experienced IT Security Architect to join our team. The ideal candidate will have a strong background in designing and implementing secure IT infrastructures, with expertise in VLAN, DNS, VPN, threat analysis, and incident response.The primary responsibilities of the IT Security Architect include:Designing and implementing secure network architectures utilizing VLANs to segment and isolate network traffic, ensuring data integrity and confidentiality.Managing and configuring DNS (Domain Name System) servers to ensure secure and efficient resolution of domain names, preventing DNS-related attacks such as cache poisoning and DNS hijacking.Implementing and maintaining VPN (Virtual Private Network) solutions to securely connect remote users and sites to the corporate network, safeguarding data transmission over public networks.Conducting thorough threat analysis and risk assessments to identify potential security vulnerabilities and developing strategies to mitigate risks effectively.Developing and implementing incident response plans and procedures to effectively detect, respond to, and recover from security incidents and breaches.Collaborating with cross-functional teams to integrate security best practices into the design and implementation of IT systems and applications.Staying abreast of the latest developments and trends in IT security technologies and methodologies, and recommending appropriate security solutions to enhance the overall security posture of the organization.Providing guidance and mentorship to junior members of the IT security team, fostering a culture of continuous learning and professional development.Requirements:Proven experience working as an IT Security Architect, with a minimum of 5 years of relevant experience.In-depth knowledge of VLANs, DNS, VPN technologies, and their implementation in enterprise environments.Strong understanding of network security principles and best practices, including firewall configuration, intrusion detection/prevention systems, and network access control.Experience conducting threat analysis, risk assessments, and developing incident response plans.Beacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs.Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com .We look forward to working with you.Beacon Hill. Employing the Future™
Security Engineer / Red Team Operator
TheCollegeBoard, Raleigh
Technology Division, Cyber Security Operations Team100% Remote (working EST)About the Team:The Cyber Security Operations team is critical to the strategic foundation of our products, most notably the secure delivery of our new Digital SAT and AP programs. We are a highly motivated group of cyber security experts who take a proactive approach to ensuring a strong security posture. We partner across the organization to mature our Threat Management and Incident Response procedures and are constantly seeking and experimenting with new technologies. We are currently using a variety of cutting-edge tools that provide comprehensive cyber security operations for the College Board's critical infrastructure in support of the College Board's mission to connect students to college success and opportunity. College Board is committed to creating an inclusive environment where all team members feel valued, respected, and supported in their work. We welcome individuals from diverse backgrounds and experiences to join our team and contribute to our ongoing success.About the RoleThe College Board is seeking a Red Team Operator who will play a critical role in strengthening our cybersecurity infrastructure. This individual will validate the effectiveness of our security controls and detection logic through offensive security operations and collaborative purple teaming exercises. Leveraging their deep understanding of threat actors, they will simulate potential cyber threats across our systems while documenting their findings and methodologies. This will provide invaluable insights into vulnerabilities and serve as a roadmap for improving our security measures. The operator will also need to communicate these results effectively to various stakeholders within the organization, ensuring leadership is aware of the potential threats and can take appropriate action to mitigate them. This work is crucial to protecting the College Board from potential cyber-attacks and ensuring the safety of our data.In this role, you will:Conduct Offensive Cyber Security Operations: Execute covert operations to assess the organization's security posture and readiness against cyber threats.Perform Penetration Testing: Conduct comprehensive assessments of the Digital Exam Player, web applications, and other systems using both manual and automated testing techniques.Engage in Purple Teaming: Facilitate collaborative exercises with internal Incident Response and Threat Hunt teams to enhance the organization's defensive capabilities.Execute Multi-stage Attack Simulation: Coordinate with Red Team members to simulate attacks, including initial access, privilege escalation, lateral movement, and data exfiltration.Create Threat Mimicry: Mimic adversary tactics, techniques, and procedures (TTPs) to assess defensive capabilities and identify weaknesses.Conduct Security Control Evaluation: Evaluate the detection and response capabilities of security controls, such as SIEM, EDR, and network monitoring solutions.Investigate C2 Techniques: Research and integrate new C2 techniques and tools to evade detection and enhance operational capabilities. Monitor and analyze C2 traffic for anomalies and indicators of compromise (IOCs).Provide Technical Guidance: Provide technical expertise and guidance to the VTM team on building custom scanning signatures and techniques. Also, guide threat hunters on adversary behaviors, attack techniques, and IOCs.Contribute to Culture Building: Foster a culture of collaboration and continuous learning within all Cyber Operations teams.Stay abreast of emerging threats and vulnerabilities affecting web applications or endpoints and incorporate them into assessment methodologies.About you, you have:A bachelor's in computer science or equivalent work experience7 years in IT, with 3 years in offensive securityExperience in Red/Purple team exercises and penetration testingProficiency in C2 frameworks (e.g., Cobalt Strike) Certifications like CEH, OSCP, GWAPT, Sec+, or GIAC preferredFamiliarity with open-source/commercial offensive security tools, and cloud-based attacker infrastructure deployment.Strong understanding of web application CWEs, OWASP Top 10, Threat Intelligence, and Threat ProfilingExperience with IDS/IPS, SIEM, network defense tools, DLP technologies, network security architecture, and enterprise anti-virus/malware solutionsProficiency with Burp Suite and testing Web Applications and API's. Familiarity/experience with Electron framework preferredAbility to maintain discretion and integrity at all timesAbility to work in the US without sponsorshipOur Benefits & Compensation:College Board offers a strong compensation and benefits package that attracts top talent looking to make a difference in education. Our robust benefits package includes health, dental, and vision insurance, tuition assistance, paid time off, paid parental leave, retirement benefits with a generous matching program, and more. We reward performance through annual bonuses and provide opportunities for salary growth over time through base compensation increases, merit raises and promotions. We believe in compensating staff members fairly in relation to each other, their qualifications, and their impact.The salary range for a new employee in this position is$120,000 to $143,000.The salary offer of an individual candidate within this range is specific to their location and qualifications. Each salary offer is determined carefully using internal and external benchmarking and adjusting for the candidate's location. You will have an opportunity to discuss salary in more detail after you begin the application process. As a self-sustaining non-profit organization with global impact, College Board offers a job that matters, a team that cares, and a place to learn, innovate and thrive!About Us:We are motivated to positively impact the educational and career trajectories of millions of students a year.We prioritize building a diverse and inclusive team where every employee can thrive, and every voice is heard.We value learning and growth; we offer formal and informal ways to lead through your superpowers, sharpen your strengths, and meet your development goals.Our high-performing engineers work with the latest technologies, so you will be constantly learning and sharpening your skills, enabling you to be industry-forward instead of left behind technologically.#LI-TheAcorn#LI-Remote
IT Cyber Security Architect
Allscripts, Raleigh
AllscriptsWelcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information.The Expert Cyber Security Engineer independently supports network, cloud, and application security tools and technologies and acts as a mentor and escalation point for junior engineers. The Expert Cyber Security Engineer must be proficient with a variety of security technologies and implements security measures to protect corporate systems from attacks, intrusion, and infiltration. Applicable technologies include antivirus, web proxy, certificate management, SIEM, patch management, access controls and vulnerability assessments within the Veradigm environment.What you will contribute:Monitors and maintains firewalls, IDS/IPS systems, web proxy, and content filtering security products for policy violations, intrusions, anomalous behaviors, and day to day incident response activitiesIndependently conducts vulnerability assessments and risk assessments with tools such as Nessus, Qualys, Metasploit, Kali and working with application and server owners to review scan results, suggest remediation actions, and track/report on progress to managementIndependently deploys, administers and troubleshoots endpoint detection and response (EDR) and antivirus (AV) solutions supporting both servers and workstationsPartners with senior engineers with securing cloud infrastructure (Azure or AWS)Independently administers authentication and access controls including provisioning, changes and deprovisioning of user and system accounts, security/access roles and access permissionsMonitors and analyzes system access logs and deploymentIndependently creates and maintains automation and scripting tools such as PowerShell, JavaScript, Python, Perl, or BashIndependently deploys and implements SIEM solution such as Microsoft Sentinel or SplunkIndependently deploys and administers full disk encryption products such as Bitlocker or PGPThe ideal candidate will have:Bachelor's Degree or equivalent Technical / Business experience Required7+ years relevant work experience; 2-3 years at the Senior level or equivalent experience Preferred7+ years Experience with full disk encryption products such as PGP or BitLocker PreferredSecurity+ or CySA+ or CASP+ or PenTest+ Comptia Security Certification preferredCISSP or GSEC or SSCP or CEH or OSCP or CCSP or MS-500 or AZ-500 Other Security Certifications preferred#LI-TS1Enhancing Lives and Building CareersVeradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work and to further their professional development. Together, we are In the Network. Interested in learning more?Take a look at our Culture, Benefits, Early Talent Program, and Additional Openings.We strongly advocate that our associates receive all CDC recommended vaccinations in prevention of COVID-19.Visa Sponsorship is not offered for this position.Veradigm policy is to provide equal employment opportunity and affirmative action in all of its employment practices without regard to race, color, religion, sex, national origin, ancestry, marital status, protected veteran status, age, individuals with disabilities, sexual orientation or gender identity or expression or any other legally protected category. Applicants for North American based positions with Veradigm must be legally authorized to work in the United States. Verification of employment eligibility will be required as a condition of hire. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce.From a "VEVRAA Federal Contractor" We request Priority Referral of Protected VeteransThis is an official Veradigm Job posting. To avoid identity theft, please only consider applying to jobs posted on our official corporate site.Thank you for reviewing this Veradigm opportunity! PI239739816
Expert Software Engineer (Backend) - Remote
Allscripts, Raleigh
AllscriptsWelcome to Veradigm! Our Mission is to be the most trusted provider of innovative solutions that empower all stakeholders across the healthcare continuum to deliver world-class outcomes. Our Vision is a Connected Community of Health that spans continents and borders. With the largest community of clients in healthcare, Veradigm is able to deliver an integrated platform of clinical, financial, connectivity and information solutions to facilitate enhanced collaboration and exchange of critical patient information.Veradigm ProviderVeradigm offers provider practices a suite of easy-to-use healthcare provider solutions that help streamline clinical and financial workflows. We then deliver actionable insights to drive improved outcomes, reduce patients out-of-pocket costs, and enhance patient understanding of their disease state and medication therapy.Our healthcare provider solutions help practices to:Reduce the administrative burden associated with ever-changing regulatory and reimbursement requirementsImprove practice financial performance and take advantage of the benefits of health information technology innovationsEnhance patient satisfaction by reducing high costs and long wait times common to many prescriptionsGet patients all their specialty medications faster and more easilyOverviewVeradigm is hiring a talented backend developer, passionate about creating life-saving technology for doctors and patients. Our cloud-based EHR is an ambitious Services Oriented Architecture hosted in AWS and written primarily in .NET, utilizing WebApi and WCF with a combination of ASP.NET and ASP.NET Core. You will take on the challenge of solving complex technical problems to deliver vital, reliable product features to our customers.Architect and lead development of technical solutions that are secure, robust, performant, and scalable.Employ technical and thought leadership to drive products from inception to release.Work with stakeholders to ensure the solution meets business needs.Write correct, well-factored code that is testable and maintainable, and that demonstrates best practices.Balance engineering costs of development, testing, deployment complexity, and run-time cost, to deliver optimum value for the business and customers.ResponsibilitiesArchitect complex application workflows across multiple services, messaging platforms, and data stores.Develop and test WebApi and WCF services that provide business logic, access a variety of data storage technologies, and interact through messaging, REST, and SOAP patterns.Write unit tests and functional tests that cover all of your code.Author SQL Server database schemas and stored procedures.Write and groom stories to define, estimate, and track your teams work.Act as rotating scrum master to help your team stay on course.Measure, find, and fix performance and security issues.Advocate for the right tools for the task at hand.Review code and provide feedback to improve code quality.Demonstrate and evangelize best practices for coding and team processes.QualificationsAcademic and Professional Qualifications:BSCS or related disciplineExperience:- 8+ yrs C#/.NET experience.- 3+ yrs in each of the following:NET WebApi, WCF, RESTRelational database developmentVersion control and continuous integrationBeing a leader in agile teams, enabling them to deliver secure, scalable solutionsDesigning solutions using architecture patterns (caching, type-ahead, retry policies, queuing, etc.)- 2+ yrs in one or more of the following:Cloud development (AWS, Azure, etc.)Document storage technologies (AWS S3, MongoDB, etc.)Messaging systems (AWS SQS, ActiveMQ, etc.)NoSQL database technologyKubernetes/DockerBonus:PythonAPI Gateway (eg. Kong)NetOps experienceHL7 standardsTravel Requirements:Very little or no travel is required in this role.Working Arrangements:Standard office environment.#LI-RemoteEnhancing Lives and Building CareersVeradigm believes in empowering our associates with the tools and flexibility to bring the best version of themselves to work and to further their professional development. Together, we are In the Network. Interested in learning more?Take a look at our Culture, Benefits, Early Talent Program, and Additional Openings.We strongly advocate that our associates receive all CDC recommended vaccinations in prevention of COVID-19.Visa Sponsorship is not offered for this position.Veradigm policy is to provide equal employment opportunity and affirmative action in all of its employment practices without regard to race, color, religion, sex, national origin, ancestry, marital status, protected veteran status, age, individuals with disabilities, sexual orientation or gender identity or expression or any other legally protected category. Applicants for North American based positions with Veradigm must be legally authorized to work in the United States. Verification of employment eligibility will be required as a condition of hire. Veradigm is proud to be an equal opportunity workplace dedicated to pursuing and hiring a diverse and inclusive workforce.From a "VEVRAA Federal Contractor" We request Priority Referral of Protected VeteransThis is an official Veradigm Job posting. To avoid identity theft, please only consider applying to jobs posted on our official corporate site.Thank you for reviewing this Veradigm opportunity! PI239739535
Cyber Security Manager
Beacon Hill Staffing Group, LLC, Raleigh
This position is responsible for guaranteeing that the security needs of stakeholders, vital for safeguarding the organization's objectives and operational workflows, are sufficiently addressed across all dimensions of enterprise architecture. This includes reference models, segment and solution architectures, as well as the resulting systems that support these objectives and workflows.Responsibilities:Lead a team to successfully complete projects, overseeing progress and tracking the status of Authorization to Operate (ATO).Investigate, analyze, and respond to cyber incidents occurring within network environments.Utilize data from various cyber defense tools to analyze and mitigate threats.Interpret, analyze, and report all events and anomalies according to network directives, including initiating, responding to, and reporting discovered events.Evaluate, test, recommend, coordinate, monitor, and maintain cybersecurity policies, procedures, and systems, including access management for hardware, firmware, and software.Ensure alignment of cybersecurity plans, controls, processes, standards, policies, and procedures with established cybersecurity standards.Identify security risks and exposures, determine causes of security violations, and propose procedures to prevent future incidents and enhance security.Develop techniques and procedures for conducting cybersecurity risk assessments, compliance audits, and evaluation and testing of hardware, firmware, and software for potential impacts on system security.Investigate and resolve security incidents such as intrusions, frauds, attacks, or leaks.Provide coaching and guidance to less-experienced professionals and serve as a Value Stream Manager.Core Competencies:Business ContinuityClient Relationship ManagementRisk ManagementSystems IntegrationTechnology AwarenessStrong communication skillsBeacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace. Individuals with Disabilities and Protected Veterans are encouraged to apply.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs. Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com . We look forward to working with you.Beacon Hill. Employing the Future™
REMOTE Data Security/DLP Business Analyst
Beacon Hill Staffing Group, LLC, Raleigh
BA for Data Security / Data Loss preventioProjects: Data sensitivity labeling within Office365 , the labeling is optional right now and will at some point be mandatory to used the labels. Also a replacement for a tool that captures all the data loss information due to it being insufficient. Another project to look at additional capabilities in Service Now.Experience in data loss as a BA, some cyber security knowledge, some Power BI background would be useful. Any Service Now platforms would be great and gathering requirements for Service Now. Jira is heavily used by this team and moving to SAFe agile from a project methodology standpoint.3 month minimum contract2hire conversionThis role will be working with the program manager on the data security and data loss prevention work stream within Global Cyber Security in which people, processes, and technologies are significantly impacted. We require a strong BA that has demonstrated success. This is a great opportunity to work within a fast-paced environment, within a global team.Support the Global Cyber Security Program by:* Gathering requirements, providing expertise and guidance, and executing plans to enhance business capability, achieve results and support the global cyber security organization.* Understanding and clearly documenting complex process flows.* Identifying and implementing business processes as well as continuous improvement initiatives by assessing alignment of current process, programs, and systems to business requirements and recognize opportunities for standardization, increased efficiency, cost reduction, increased quality, and improved user experience to enhance performance of the program.* Providing recommendations for improvement and implementing procedural changes to ensure technical solutions align with organizational objectives, regulatory standards, and business needs.* Identifying and eliminating risks to complex change implementation by planning user acceptance testing, clarifying, and ensuring developers understand requirements, coordinating users, executing tests, monitoring test completion, escalating defects/issues, and soliciting feedback to support accurate testing and alignment with desired outcomes.* Facilitating meetings supporting all phases of assigned projects, using appropriate tools and technology according to meeting objectives and attendees.Primary Responsibilities* Foster a partnered approach, building and maintaining strong productive working relationships with internal stakeholders aligning service delivery with business needs.* Develop implementation and improvement plans by eliciting business requirements from stakeholders to identify business needs, evaluate requirements and desired outcomes, analyze gaps between current and future state, and recommend solutions.* Understand and clearly document complex process flows.* Develop a list of technical business requirements based on discussions with stakeholders, engineers, and end users and analyze them for accuracy, completeness, redundancy, ambiguity, and testability.* Discuss complex technical details at a high level with leadership/stakeholders and at a low level with engineers and architects.* Assess, document, and communicate impact of change to business and individuals by collaborating with internal and external key stakeholders to analyze information needs and functional requirements, accurately define costs, schedule timeline, and evaluate interdependencies to develop business requirements documentation for key stakeholder engagement.* Support end-users by thoroughly understanding user requirements and user experience.* Assist with the identification of training requirements for assigned projects and business units by providing input to the training plan, supporting the development of training materials and participating in the training for assigned projects as required.* Analyze business requirements for accuracy, completeness, redundancy, ambiguity, and testability.* Identify and eliminate risks to complex change implementation by planning user acceptance testing, clarifying, and ensuring developers understand requirements, coordinating users, executing tests, monitoring test completion, escalating defects/issues, and soliciting feedback to support accurate testing and alignment with desired outcomes.* Design and provision reporting solutions to enable project decision making, tracking and implementation.* Adhere to data policies & standards, while also enforcing correct management of sensitive data in compliance with global business rules, legal and governmental regulations.* Ensure data integrity, accuracy and reconciliation within reports and dashboards by reviewing, identifying, and resolving gaps and inconsistencies.Required Qualifications* Education: Bachelor's degree or equivalent combination of education and work experience.* Experience: 4 years relevant experience.* Ability to work global hours (US, UK, and Australia time zones).* Excellent communication, analytical and interpersonal skills.* Working knowledge of cyber security projects and programs and managing requirements and testing on the projects.* Experience collaborating with technical team members, business analysts, and project/program managers to ensure a quality solution is delivered.* Evidence of successful participation in the delivery of complex programs.* Effective collaboration, communication, and strong stakeholder management skills.* Impact analysis and strong problem-solving skills when gathering and assessing business needs to overcome potential obstacles and challenges.* Facilitate meetings supporting all phases of assigned projects, using appropriate tools and technology according to meeting objectives and attendees.* Self-motivated, assertive, detail oriented, high degree of organization skills and the ability to appropriately prioritize assigned tasks to ensure timely goal achievement.Preferred Qualifications* Experience with software including Jira, Confluence, Microsoft O365.* Experience using Data Security Technology/Solutions such as Data Loss Prevention and Data Classification.* Working knowledge and understanding of SharePoint, SQL, relational databases, and reporting tools such as Power BI, Tableau, MS Reporting Services and Excel.* Working knowledge of terminology, function and fundamental capabilities of common computer, software, information and communication technology devices, components, and concepts.* An understanding of IT networking and infrastructure.* Working knowledge of the ServiceNow platform and modules.Preferred Competencies/Skills* Understand the principles underlying the relationship among facts and apply this understanding when solving problems.* Observe and evaluate the outcome of a business need and interpret the results and their implications.* Foresee potential obstacles and challenges, identifying root cause and recommending plans to address.* Effectively present thoughts to influence and persuade organizational leaders and key stakeholders to adopt innovative recommendations.* Utilize advanced written and oral communication skills to inform key stakeholders.* Navigate organizational structure by networking and building relationships among multiple business units.* Share knowledge and educate others.* Exhibit leadership in everyday interactions.* Successfully engage in multiple initiatives simultaneously.* Work effectively under pressure; develop and adhere to deadlines.* Adapt and be flexible in a complex, changing environment.Beacon Hill is an Equal Opportunity Employer that values the strength diversity brings to the workplace.If you would like to complete our voluntary self-identification form, please click here or copy and paste the following link into an open window in your browser: https://jobs.beaconhillstaffing.com/eeoc/Completion of this form is voluntary and will not affect your opportunity for employment, or the terms or conditions of your employment. This form will be used for reporting purposes only and will be kept separate from all other records.Company Profile:Beacon Hill Technologies, a premier National Information Technology Staffing Group, provides world class technology talent across all industries utilizing a complete suite of staffing services. Beacon Hill Technologies' dedicated team of recruiting and staffing experts consistently delivers quality IT professionals to solve our customers' technical and business needs.Beacon Hill Technologies covers a broad spectrum of IT positions, including Project Management and Business Analysis, Programming/Development, Database, Infrastructure, Quality Assurance, Production/Support and ERP roles.Learn more about Beacon Hill Staffing Group and our specialty divisions, Beacon Hill Associates, Beacon Hill Financial, Beacon Hill HR, Beacon Hill Legal, Beacon Hill Life Sciences and Beacon Hill Technologies by visiting www.beaconhillstaffing.com .We look forward to working with you.Beacon Hill. Employing the Future (TM)
Specialist- Expert
V-Soft Consulting Group, Inc., Raleigh
Specialist - ExpertPrimary Location: Raleigh, North CarolinaV-Soft Consulting is currently hiring for a Specialist - Expert for our premier client in Raleigh, North Carolina.Education And Experience "Skilled in different types of computer hardware, software, peripherals and components, networking protocols and communications.: 7 Years.Installing and imaging new computers and loading of appropriate software for customers.: 7 Years.Installing local and network printers and other peripherals and configuration of same.: 7 Years.Migrating data and user profiles.: 7 Years.Documenting process and procedures related to technical field support activities.: 7 Years.Demonstrates knowledge and a working experience with ServiceNow call tracking system.: 7 Years.What You'll DoJob Responsibilities:Project ManagementAbility to lead projects that require directing the work of others and with some latitude on actions or decisions.Leads team efforts and assesses and integrates the skills and strengths of individuals for project and organizational success.Provides status on project work to management.Develop And Maintain Appropriate Documentation For All Responsible AreasThis position is responsible for creating and maintaining all documentation of process and procedures for all areas this position is responsible for.This documentation is to be used by team members for operational standards of daily work.This documentation will also be used in accordance with Operational Level Agreements (IT internal) and Service Level Agreements (IT external).All documentation should be reviewed annually.System SecurityIt is the responsibility of all Technical Services Staff to be aware of DOT and ITS security policies, as well as the security issues directly affecting the systems and technology for which this position is directly involved.This position is responsible for implementing requirements of the IT Security Office and protecting data from unauthorized access, alteration, destruction, or usage in a manner inconsistent with covered IT Security Policies and standards.Interested?Qualified candidates should send their resumes to [email protected] Consulting Group is recognized among the top 100 fastest growing staffing companies in North America, V-Soft Consulting Group is headquartered in Louisville, KY with strategic locations in India, Canada and the U.S. V-Soft is known as an agile, innovative technology services company holding several awards and distinctions and has a wide variety of partnerships across diverse technology stacks.As a valued V-Soft Consultant, you're eligible for full benefits (Medical, Dental, Vision), a 401(k) plan, competitive compensation and more. V-Soft is partnered with numerous Fortune 500 companies, exceptionally positioned to advance your career growth.V-Soft Consulting provides equal employment opportunities to all employees and applicants for employment and prohibits discrimination and harassment of any type without regard to race, color, religion, age, sex, national origin, disability status, genetics, protected veteran status, sexual orientation, gender identity or expression, or any other characteristic protected by federal, state or local laws.For more information or to view all our open jobs, please visit www.vsoftconsulting.com or call (844) 425-8425.#INDSP