...Enterprise Sales Professional to drive new email security business. This role will demand interaction with large scale enterprises at the CIO, IT Director and CISO level, as well as with technical staff within the s...
...innovative solutions to Voya's Retirement, Employee Benefits, and
Investment Management businesses.
Position Summary:
The Information Security Senior Executive (Audit and Compliance) will be responsible f...
...Assessing and quantifying cybersecurity risks in the OT environment, considering emerging threats, vulnerabilities, and industry best... ...closely with internal teams such as internal audit,...
...we do, and is reflected in our employees and the products we build
together.
Responsibilities:
Develop and implement Pixis' information security strategy, policies, standards, and procedures to protect against po...
...Retirement, Employee Benefits, and
Investment Management businesses.
Position Summary:
The Information Security Senior Executive (Audit and Compliance) will be responsible for establishing and maintaining an effe...
...We are looking for an IT EXECUTIVE to be responsible and accountable for the smooth running of our computer systems within the limits... .... The successful candidate will have improved skil...
...updates, risks, and strategies to executive leadership and stakeholders.
Leadership Development: Mentor and develop security practitioners, contributing to large-scale security projects and ensuring successful i...
...we do, and is reflected in our employees and the products we build
together.
Responsibilities:
Develop and implement Pixis' information security strategy, policies, standards, and procedures to protect against po...
...sharing ideas openly and honestly.
Primary Purpose
As a Cyber Security Analyst, you will be responsible for monitoring, analyzing, and implementing security measures to protect our organization's inf...
...valued.3. Leadership and Communication Skills :- A cyber security manager is expected to lead and manage a team of security professionals.-... ...requirements.- Create incident response plans...