Highlighting what I think is a very cool role we have open. We are seeking a Subscriber Management Analyst to join our team in Charleston. This role pulls together your project management chops, technical knowledge, and problem solving skills into one interesting job. This is one of my favorite roles to recruit and I would love for you to find out why. https://lnkd.in/eXz5fpYA Kerry (Blake) Lugenbeal Adapt Forward
Kellie Richter Kinard, SHRM-CP’s Post
More Relevant Posts
-
Opportunity
Federal Technical Recruiter and Digital Marketing Outreach at Cybersecurity and Infrastructure Security Agency
Looking for a Supervisory and Program Management position? 👀 no further as we have the perfect role for you at #cisa with our Infrastructure Security Division! If this position is of interest to you, please apply on the below link. 📍 Arlington, VA 🏢 Telework eligible as determined by the agency policy. ✈ 25% or less-You may be expected to travel for this position. 🔏 TS/SCI https://lnkd.in/ewNwU8dw
Supervisory Management and Program Analyst
usajobs.gov
To view or add a comment, sign in
-
#hiring Incident Triage Analyst, Charlotte, United States, fulltime #jobs #jobseekers #careers #Charlottejobs #NorthCarolinajobs #ITCommunications Apply: https://lnkd.in/guf57sUg The Incident Triage Analyst will drive active incidents through remediation and will assist tracking all gaps identified during an incident. They will serve as an escalation point, coordinating across multiple areas from Operations, service teams, OneSupport, architecture, networking, and more. This position will provide incident scribing, intelligence reporting, and metrics. The position reports to the Manager of Risk Treatment and Incident Triage. They will collaborate closely with external partners, security architecture teams, risk centric security teams, and other internal stakeholders to empower the business and continuously enhance the security posture of the organization. Cybersecurity Risk, a team within OneMain's Enterprise Risk Management organization, is a fast-growing team focused on providing expert insight into risk, developing team members, and effective oversight of cybersecurity and technology risk. This is a team where you can work with great team members across the Cyber Risk, Cyber Tech, Risk Management, and Technology organizations. You will be challenged to excel with exciting and challenging opportunities daily. There is transparency and great support from management teams to allow team members to be effective, grow their careers and meet company goals. Hard work and initiative are rewarded and recognized by management and colleagues alike, which promotes a culture of respect and value across the organization. Within the Cybersecurity Risk team, you will be conducting meaningful work and making a difference in the lives of OneMain's customers and team members by promoting a cybersecurity culture, optimizing cybersecurity capabilities, protecting data, and developing cyber resilient programs. Key Responsibilities: Support the IR lifecycle by assisting to triage events of potential incidents and establish root cause of findings Be able to tell a story with data from documenting an incident as a scribe to creating meaningful metrics and writing reports Bring consistency and cohesion to the program by assisting with the updates of team processes Support regulatory and audit findings through artifact generation Must build and maintain strong working relationships with partner teams from IT engineering, End User Computing, Operations, and other stakeholders to remediate Information Security and/or Vulnerability Findings. Exercise sounds judgement while triaging potential incidents Work with other industry experts on learning, exploring, and adapting new best practices Escalate issues appropriately and in a timely fashion with minimal supervision Revise and update documentation Evaluate information to determine compliance with standards Create metrics and support lea
https://www.jobsrmine.com/us/north-carolina/charlotte/incident-triage-analyst/471301855
To view or add a comment, sign in
-
#hiring Incident Triage Analyst, Charlotte, United States, fulltime #jobs #jobseekers #careers #Charlottejobs #NorthCarolinajobs #ITCommunications Apply: https://lnkd.in/guf57sUg The Incident Triage Analyst will drive active incidents through remediation and will assist tracking all gaps identified during an incident. They will serve as an escalation point, coordinating across multiple areas from Operations, service teams, OneSupport, architecture, networking, and more. This position will provide incident scribing, intelligence reporting, and metrics. The position reports to the Manager of Risk Treatment and Incident Triage. They will collaborate closely with external partners, security architecture teams, risk centric security teams, and other internal stakeholders to empower the business and continuously enhance the security posture of the organization. Cybersecurity Risk, a team within OneMain's Enterprise Risk Management organization, is a fast-growing team focused on providing expert insight into risk, developing team members, and effective oversight of cybersecurity and technology risk. This is a team where you can work with great team members across the Cyber Risk, Cyber Tech, Risk Management, and Technology organizations. You will be challenged to excel with exciting and challenging opportunities daily. There is transparency and great support from management teams to allow team members to be effective, grow their careers and meet company goals. Hard work and initiative are rewarded and recognized by management and colleagues alike, which promotes a culture of respect and value across the organization. Within the Cybersecurity Risk team, you will be conducting meaningful work and making a difference in the lives of OneMain's customers and team members by promoting a cybersecurity culture, optimizing cybersecurity capabilities, protecting data, and developing cyber resilient programs. Key Responsibilities: Support the IR lifecycle by assisting to triage events of potential incidents and establish root cause of findings Be able to tell a story with data from documenting an incident as a scribe to creating meaningful metrics and writing reports Bring consistency and cohesion to the program by assisting with the updates of team processes Support regulatory and audit findings through artifact generation Must build and maintain strong working relationships with partner teams from IT engineering, End User Computing, Operations, and other stakeholders to remediate Information Security and/or Vulnerability Findings. Exercise sounds judgement while triaging potential incidents Work with other industry experts on learning, exploring, and adapting new best practices Escalate issues appropriately and in a timely fashion with minimal supervision Revise and update documentation Evaluate information to determine compliance with standards Create metrics and support lea
https://www.jobsrmine.com/us/north-carolina/charlotte/incident-triage-analyst/471301855
To view or add a comment, sign in
-
#hiring Incident Triage Analyst, Fort Worth, United States, fulltime #jobs #jobseekers #careers #FortWorthjobs #Texasjobs #ITCommunications Apply: https://lnkd.in/gH6Rkvw4 The Incident Triage Analyst will drive active incidents through remediation and will assist tracking all gaps identified during an incident. They will serve as an escalation point, coordinating across multiple areas from Operations, service teams, OneSupport, architecture, networking, and more. This position will provide incident scribing, intelligence reporting, and metrics. The position reports to the Manager of Risk Treatment and Incident Triage. They will collaborate closely with external partners, security architecture teams, risk centric security teams, and other internal stakeholders to empower the business and continuously enhance the security posture of the organization. Cybersecurity Risk, a team within OneMain's Enterprise Risk Management organization, is a fast-growing team focused on providing expert insight into risk, developing team members, and effective oversight of cybersecurity and technology risk. This is a team where you can work with great team members across the Cyber Risk, Cyber Tech, Risk Management, and Technology organizations. You will be challenged to excel with exciting and challenging opportunities daily. There is transparency and great support from management teams to allow team members to be effective, grow their careers and meet company goals. Hard work and initiative are rewarded and recognized by management and colleagues alike, which promotes a culture of respect and value across the organization. Within the Cybersecurity Risk team, you will be conducting meaningful work and making a difference in the lives of OneMain's customers and team members by promoting a cybersecurity culture, optimizing cybersecurity capabilities, protecting data, and developing cyber resilient programs. Key Responsibilities: Support the IR lifecycle by assisting to triage events of potential incidents and establish root cause of findings Be able to tell a story with data from documenting an incident as a scribe to creating meaningful metrics and writing reports Bring consistency and cohesion to the program by assisting with the updates of team processes Support regulatory and audit findings through artifact generation Must build and maintain strong working relationships with partner teams from IT engineering, End User Computing, Operations, and other stakeholders to remediate Information Security and/or Vulnerability Findings. Exercise sounds judgement while triaging potential incidents Work with other industry experts on learning, exploring, and adapting new best practices Escalate issues appropriately and in a timely fashion with minimal supervision Revise and update documentation Evaluate information to determine compliance with standards Create metrics and support leadership updates
https://www.jobsrmine.com/us/texas/fort-worth/incident-triage-analyst/471301856
To view or add a comment, sign in
-
Just in the last month, my team has filled a number of positions in various industries, across multiple security disciplines with an array of talent. How did we do this in this market? Clear and concise communication between my team and the managers we’re partnering with. We helped a non profit hire a do-it-all security engineer within salary requirements under market standards, a leading health insurance company hire a wizard in the application security space, a defense contractor hire a tenure security engineer with extensive networking experience, a whole sale manufacturing company hire a rockstar cloud security engineer with tight geographic constraints, a major hospital hire a security analyst that was open over a year due to tight budget and 5 days a week on site, a key player in the financial services space hire an engineer that will totally transform the way their security program is structured and even a locally owned manufacturing company hire someone to come on site 5 days a week in a small town to help them stand up a concrete GRC program. The reason we showed success and delivered for our clients is because we gained a true understanding of what it is they needed and who would add value to their team, program and/or organization. Communication was key. Accountability was key. Hard work was key. If you’re struggling to fill roles, I IMPLORE you to really PARTNER with your recruiter and help them understand what it is you need. Not just a few buzz words. And if you hire for security and your vendors aren’t doing you justice, my inbox is always open 😉
To view or add a comment, sign in
-
#hiring Incident Triage Analyst, Fort Worth, United States, fulltime #jobs #jobseekers #careers #FortWorthjobs #Texasjobs #ITCommunications Apply: https://lnkd.in/ghnnhy97 The Incident Triage Analyst will drive active incidents through remediation and will assist tracking all gaps identified during an incident. They will serve as an escalation point, coordinating across multiple areas from Operations, service teams, OneSupport, architecture, networking, and more. This position will provide incident scribing, intelligence reporting, and metrics. The position reports to the Manager of Risk Treatment and Incident Triage. They will collaborate closely with external partners, security architecture teams, risk centric security teams, and other internal stakeholders to empower the business and continuously enhance the security posture of the organization. Cybersecurity Risk, a team within OneMain's Enterprise Risk Management organization, is a fast-growing team focused on providing expert insight into risk, developing team members, and effective oversight of cybersecurity and technology risk. This is a team where you can work with great team members across the Cyber Risk, Cyber Tech, Risk Management, and Technology organizations. You will be challenged to excel with exciting and challenging opportunities daily. There is transparency and great support from management teams to allow team members to be effective, grow their careers and meet company goals. Hard work and initiative are rewarded and recognized by management and colleagues alike, which promotes a culture of respect and value across the organization. Within the Cybersecurity Risk team, you will be conducting meaningful work and making a difference in the lives of OneMain's customers and team members by promoting a cybersecurity culture, optimizing cybersecurity capabilities, protecting data, and developing cyber resilient programs. Key Responsibilities: Support the IR lifecycle by assisting to triage events of potential incidents and establish root cause of findings Be able to tell a story with data from documenting an incident as a scribe to creating meaningful metrics and writing reports Bring consistency and cohesion to the program by assisting with the updates of team processes Support regulatory and audit findings through artifact generation Must build and maintain strong working relationships with partner teams from IT engineering, End User Computing, Operations, and other stakeholders to remediate Information Security and/or Vulnerability Findings. Exercise sounds judgement while triaging potential incidents Work with other industry experts on learning, exploring, and adapting new best practices Escalate issues appropriately and in a timely fashion with minimal supervision Revise and update documentation Evaluate information to determine compliance with standards Create metrics and support leadership updates
https://www.jobsrmine.com/us/texas/fort-worth/incident-triage-analyst/470575151
To view or add a comment, sign in
-
Trust and Safety Operational Team Structure As our digital landscape continues to evolve, the importance of trust and safety roles in various industries becomes more crucial than ever. There are many unique skills/expertise that are required to build a solid #trustandsafety program. Based on my experience, the following roles are the baseline for any T&S team: Content Moderator: Responsible for reviewing and moderating user-generated content to maintain a safe and compliant online environment. Fraud Analyst: Specializes in detecting and preventing fraudulent activities to safeguard users and the platform. Threat Intelligence Analyst: Monitors and analyzes emerging threats, providing insights to proactively address potential risks. Incident Responder: Responds swiftly to security incidents, investigates, and implements measures to prevent future occurrences. Policy Enforcement Manager: Develops and enforces policies to ensure users adhere to community guidelines and standards. Safety Operations Manager: Manages the day-to-day operations of safety teams, ensuring a proactive approach to potential issues while coaching and motivating their teams What other roles would you suggest adding to the list? #TrustAndSafety #OnlineSecurity #contentmoderation
To view or add a comment, sign in
-
Enterprise IT Architect | Fintech | Digital banking | Product and Project Management | Software Developer
CIO/CTO/CTIO/CDIO/CDO can be summarised as a Lead Product and Technology Officer. What do they do; 1. Understand the overall business strategy. 2. Understand, architect and build Technology around 1 above while having good knowledge of the product(s) life cycle. Technology must contribute to the commercial/numbers aspect of every initiative whether directly, customer experience or operations excellence. 3. Build high output sustainable teams around technology, Product support and business support. Here you learn to adapt, transform and survive. You and your team cannot impact business. 4. Be an all round business engine (Product architect, Systems administrator, systems architect, cyber security expert, Data analyst, value addition expert - labelled innovation). 5. Miracle worker on technology costs. Let us see your take in the comments.
To view or add a comment, sign in
-
ISC2 CC | Cloud Infrastructure | Cyber security | Cyber Threat Intelligence | Cyber Forensics | Risk, Threat and Vulnerability Management
After successfully collaborating with the team to develop and implement robust and comprehensive information security policies at CyBlack, which comprise information security policy, vehicle security policy, information classification policy, privilege account policy, e.t.c., in compliance with ISO 27002 during the #GRC sprint, we were mandated to take on the role of a #SOC analyst in T6 holdings Ltd to investigate security threats, manage vulnerabilities within the network, analyze malware, and develop comprehensive security reports. Below are the highlights: 🐞 Utilized the #NIST framework for incident response to analyze crowdstrike #EDR alert. 🐞 Investigated and responded to phishing emails threats reported by several employees. 🐞 Investigated and analyzed malware files that infected several servers infrastructure. 🐞 Collaborated with a team of five to carry out vulnerability management on 500 obsolete mobile devices, resulting in 65% update of devices and effective security management. 🐞 Utilized Microsoft sentinel to create a custom alert rule for effective threat management and high volume of threat detection. 🐞 Utilized the Microsoft patch Tuesday to apply patches to address known vulnerabilities in Microsoft products and services. Below are some appropriate recommendations provided to the organization: 🤜 Implement #RBAC to help enforce the principle of least privilege across the organization's access control policies. 🤜 Enforcing MFA across all employees. 🤜 Conduct a security awareness training to spot suspicious phishing attempts. Special thanks to Jude Osamor and Aliyu G. Y. for making the task seems easy when its not 😊 #SocOps #Microsoftpatchtuesday
analyst.in
analyst.in
To view or add a comment, sign in
Systems Engineer | Multi-Cloud Customer Advisory Council Member | USN Veteran
1moMelissa Connelly