We are looking for a high-caliber Service Design Consultant to join us as a contractor. You will be the architect behind our future-state Wealth Distribution model, bridging the gap between high-level strategy and the granular details of bu...
We are looking for a high-caliber Service Design Consultant to join us as a contractor. You will be the architect behind our future-state Wealth Distribution model, bridging the gap between high-level strategy and the granular details of bu...
We are seeking an experienced ServiceNow CIS-VR Implementor to join our growing ServiceNow practice. In this role, you will lead the design, configuration, and deployment of the Vulnerability Response (VR) application, ensuring clients can ...
We are seeking an experienced ServiceNow CIS-VR Implementor to join our growing ServiceNow practice. In this role, you will lead the design, configuration, and deployment of the Vulnerability Response (VR) application, ensuring clients can ...
Job Description: The SAP Identity Analyst will focus on enhancing and securing access to SAP systems. The majority of the work will include rationalizing, designing, and implementing SAP roles, maintaining SU24, and configuring identity and...
Role Purpose: Migrating 300 customers from our legacy BTV platform to the new platform in 12 months, working within the BTV PMO team with 4 other team members, the (2) project managers will be focused on this specific project. Responsibi...
Role Purpose: Migrating 300 customers from our legacy BTV platform to the new platform in 12 months, working within the BTV PMO team with 4 other team members, the (2) project managers will be focused on this specific project. Responsibi...
Responsible for proactively identifying, exploiting, and documenting security vulnerabilities across the organization's enterprise applications, infrastructure, and physical security controls. 1. Primary Focus The role focuses on identi...
Responsible for proactively identifying, exploiting, and documenting security vulnerabilities across the organization's enterprise applications, infrastructure, and physical security controls. 1. Primary Focus The role focuses on identi...
Requirements: - Minimum of 3 years of general experience in an IT Enterprise environment. - Experience with Okta including Okta Workflows, SSO, and Okta Identity Governance - Familiarity with authentication protocols such as SAML, OAuth,...
Requirements: - Minimum of 3 years of general experience in an IT Enterprise environment. - Experience with Okta including Okta Workflows, SSO, and Okta Identity Governance - Familiarity with authentication protocols such as SAML, OAuth,...
The Threat Intelligence Security Engineer is a hands-on, contract position responsible for operationalizing, measuring, and maximizing the return on investment (ROI) from the organization's external threat intelligence assets and monitoring...
The Threat Intelligence Security Engineer is a hands-on, contract position responsible for operationalizing, measuring, and maximizing the return on investment (ROI) from the organization's external threat intelligence assets and monitoring...
We are seeking a highly skilled and experienced contractor to develop and execute a comprehensive training strategy for the successful onboarding of our new replacement system for the existing MCAT platform. This critical role involves anal...
We are seeking a highly skilled and experienced contractor to develop and execute a comprehensive training strategy for the successful onboarding of our new replacement system for the existing MCAT platform. This critical role involves anal...