This role supports the identification and implementation of security requirements needed to protect organizational data and systems. It involves evaluating cybersecurity controls, conducting risk assessments, contributing to security architecture, and integrating cybersecurity into system development and configuration management processes. The position also collaborates with customers, IT teams, and executive leadership to meet cybersecurity objectives, support legacy system integration, and prepare security authorization documentation for operational environments.
Stand Out From the Crowd
Upload your resume and get instant feedback on how well it matches this job.
Job Type
Full-time
Career Level
Mid Level