{"4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50-57a2af4ba375210e78131769d42f518c":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50/57a2af4ba375210e78131769d42f518c.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Apptad","salary":"","summary":" best practices and frameworks (e.g., ITIL, COBIT). Drive automation and innovation in service delivery. Risk & Compliance...","source":"careerjet","job":"4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50-57a2af4ba375210e78131769d42f518c","posted":"09-Aug-25","jobTitle":"Desktop Lead/Manager"},"1e1f416e410b1a0a072745001d1307131c0031060e1a444e585f2f27030152100026060607090045066a3a16495e4f44591d4f2b4913490d0d041c6535521d060a1a5a4a510d680a0807491145116a2202081044543b0c105f59545954655e57104711-326c723e2907b486bbc1dcff7a879aa7":{"location":"Philadelphia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1e1f416e410b1a0a072745001d1307131c0031060e1a444e585f2f27030152100026060607090045066a3a16495e4f44591d4f2b4913490d0d041c6535521d060a1a5a4a510d680a0807491145116a2202081044543b0c105f59545954655e57104711/326c723e2907b486bbc1dcff7a879aa7.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Children’s Hospital of Philadelphia","salary":"$126560 - 167690 per year","summary":" such as NIST SP 800-53, HIPAA, PCI-DSS, CISA ZTMM, CIS Benchmarks, and Microsoft CAF Secure Methodology, AWS CAF, AWS WellSecurity Manager (CISM) - Information Systems Audit and Control Association (ISACA) - upon hire - Preferred or Certified...","source":"careerjet","job":"1e1f416e410b1a0a072745001d1307131c0031060e1a444e585f2f27030152100026060607090045066a3a16495e4f44591d4f2b4913490d0d041c6535521d060a1a5a4a510d680a0807491145116a2202081044543b0c105f59545954655e57104711-326c723e2907b486bbc1dcff7a879aa7","posted":"09-Jul-25","jobTitle":"Cloud Security Engineer Principal"},"4f1e416e54060a1c072745001d1307131c00370707005f47494c43106d2d5e16451148320b0410521d1c1071794e5e585f0d1b1707374f0d1b140213044e006a2a0a484e4f0d6e0b011d5218540206156c340043011a0007532a0c1419575d-b3ffb94306b22c3730d1985e76476bab":{"location":"King of Prussia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4f1e416e54060a1c072745001d1307131c00370707005f47494c43106d2d5e16451148320b0410521d1c1071794e5e585f0d1b1707374f0d1b140213044e006a2a0a484e4f0d6e0b011d5218540206156c340043011a0007532a0c1419575d/b3ffb94306b22c3730d1985e76476bab.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Vaco","salary":"","summary":" certifications such as CISSP, CISM, CISA, or Palo Alto Networks certifications are preferred. Preferred Qualifications: Hands...","source":"careerjet","job":"4f1e416e54060a1c072745001d1307131c00370707005f47494c43106d2d5e16451148320b0410521d1c1071794e5e585f0d1b1707374f0d1b140213044e006a2a0a484e4f0d6e0b011d5218540206156c340043011a0007532a0c1419575d-b3ffb94306b22c3730d1985e76476bab","posted":"11-Aug-25","jobTitle":"Cyber Security Consultant"},"1b12417e480a0601555461101b0e0d0e0454116a20270a79545e4666263a073d74613b04000e0a5254213d71637f1d6c5e17000d4e155406695057505611-d40f222b7f0a63825945d48a8c971c27":{"location":"Philadelphia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1b12417e480a0601555461101b0e0d0e0454116a20270a79545e4666263a073d74613b04000e0a5254213d71637f1d6c5e17000d4e155406695057505611/d40f222b7f0a63825945d48a8c971c27.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Information Consulting Services","salary":"","summary":" of related work experience with a professional services firm, or part of an internal audit function CISA, CISSP, CISM, CPAlicense/certification preferred Understanding of IT risk management and cybersecurity risk management standards (COBIT, NIST...","source":"careerjet","job":"1b12417e480a0601555461101b0e0d0e0454116a20270a79545e4666263a073d74613b04000e0a5254213d71637f1d6c5e17000d4e155406695057505611-d40f222b7f0a63825945d48a8c971c27","posted":"26-Jul-25","jobTitle":"IT Risk Senior Associate"},"184a417f4417044e6a154e020f041c6535521b0b0c00590b704c4305080b5576651b18041c0e004e170d0d53674a534c4a011d6c6a154e020f041c65374907036842131c0e1c-eb5034c48473408d695b9cb31f56e1ba":{"location":"Philadelphia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-184a417f4417044e6a154e020f041c6535521b0b0c00590b704c4305080b5576651b18041c0e004e170d0d53674a534c4a011d6c6a154e020f041c65374907036842131c0e1c/eb5034c48473408d695b9cb31f56e1ba.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Grant Thornton","salary":"","summary":" practice or function servicing cross-industry clients at a national level Certification required, CPA, CISA, CISSP, CIAor CISM preferred Sarbanes-Oxley compliance and internal audit experience preferred Experience performing financial...","source":"careerjet","job":"184a417f4417044e6a154e020f041c6535521b0b0c00590b704c4305080b5576651b18041c0e004e170d0d53674a534c4a011d6c6a154e020f041c65374907036842131c0e1c-eb5034c48473408d695b9cb31f56e1ba","posted":"14-Jun-25","jobTitle":"Process Risk Experienced Manager"},"1a48417f4417044e6a154e020f0403020b54543a0000410b7c434c08161d5376720a1b0a4e2a044e150f0c1e4f45492f7f0d1c0507354e0204181d13676d150608144f46584359442e00461859101c633812094e111a08114347545954442e00461859101c605f5e521445-0dc4c006700aad9bf091415fcb7c3d13":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1a48417f4417044e6a154e020f0403020b54543a0000410b7c434c08161d5376720a1b0a4e2a044e150f0c1e4f45492f7f0d1c0507354e0204181d13676d150608144f46584359442e00461859101c633812094e111a08114347545954442e00461859101c605f5e521445/0dc4c006700aad9bf091415fcb7c3d13.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Wabtec","salary":"","summary":" a plus (CRISC, CISM, CISA, or CISSP) What will your typical day look like? Vulnerability Management Program Development...","source":"careerjet","job":"1a48417f4417044e6a154e020f0403020b54543a0000410b7c434c08161d5376720a1b0a4e2a044e150f0c1e4f45492f7f0d1c0507354e0204181d13676d150608144f46584359442e00461859101c633812094e111a08114347545954442e00461859101c605f5e521445-0dc4c006700aad9bf091415fcb7c3d13","posted":"25-Jun-25","jobTitle":"Risk Analyst - Vulnerability Management"},"21498292":{"jobPath":"/jobs/21498292/adjunct-faculty-cybersecurity","source":"naylor","job":"21498292","jobTitle":"Adjunct Faculty - Cybersecurity"},"191f416f5817060042075343250000060245066a2a1c445f4f424144220f491547061a632c1216491a0d1a000a685243591600022539410d09060b1567631b061d0145473c1f1d545958-d070b9cb244c4466a5d5c382e828415a":{"location":"Yardley, PA","jobPath":"https://jobviewtrack.com/en-gb/job-191f416f5817060042075343250000060245066a2a1c445f4f424144220f491547061a632c1216491a0d1a000a685243591600022539410d09060b1567631b061d0145473c1f1d545958/d070b9cb244c4466a5d5c382e828415a.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Cenlar","salary":"","summary":" organization Additional Requirements for Technology Technology professional certification a plus (e.g., CISA, CRISC, CISM...","source":"careerjet","job":"191f416f5817060042075343250000060245066a2a1c445f4f424144220f491547061a632c1216491a0d1a000a685243591600022539410d09060b1567631b061d0145473c1f1d545958-d070b9cb244c4466a5d5c382e828415a","posted":"26-Jul-25","jobTitle":"Business Control Manager"},"4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f-9b8b15c36e7646efe3f0ac4a828efcdc":{"location":"King of Prussia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f/9b8b15c36e7646efe3f0ac4a828efcdc.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"TMC Bonham Hospital","salary":"","summary":" to the COSO/COBIT Framework and the Standards for the Professional Practice of Internal Auditing published by the Institute...): Certified Public Accountant (CPA), Certified Information Systems Auditor (CISA), Certified Information Security Systems...","source":"careerjet","job":"4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f-9b8b15c36e7646efe3f0ac4a828efcdc","posted":"05-Jul-25","jobTitle":"Assistant Director - IT Internal Audit & Data Analytics"},"1a13417e480a06015554690d1c041c09044c54291c17435f525f2f370a004e1b524321354e2610441d1c06012862690d640a1b0b551a410f48201b030c541b1a6b3a445f585f4305034e6601440a1c0e1c652c7454291c17435f525f2c55565b1344-01e27d8d36c9f0a68e3b43b609f89a03":{"location":"Marietta, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1a13417e480a06015554690d1c041c09044c54291c17435f525f2f370a004e1b524321354e2610441d1c06012862690d640a1b0b551a410f48201b030c541b1a6b3a445f585f4305034e6601440a1c0e1c652c7454291c17435f525f2c55565b1344/01e27d8d36c9f0a68e3b43b609f89a03.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Donegal Insurance Group","salary":"$90000 - 110000 per year","summary":" Science, Information Technology, Accounting, or a related field. CISA is preferred. Additional certifications such as CISSP..., CIA, CPA, and CISM are desirable. 5+ years of experience in IT auditing, information security, IT risk management...","source":"careerjet","job":"1a13417e480a06015554690d1c041c09044c54291c17435f525f2f370a004e1b524321354e2610441d1c06012862690d640a1b0b551a410f48201b030c541b1a6b3a445f585f4305034e6601440a1c0e1c652c7454291c17435f525f2c55565b1344-01e27d8d36c9f0a68e3b43b609f89a03","posted":"12-Jul-25","jobTitle":"Senior IT Internal Auditor"},"131a41644901011a4e005943090f0a472443170d1a000a665c434c030a03421a546138130103104300482412444a5a485f443f1c481055001c4123060b41130d0416445f3f644901011a4e00594329020d0216535425081d4b4c585f2f341d0143014317482c0f090447111a6b23584459584e104f21501a4511695057505611-b5401b297df84f2091dcdf85e6802491":{"location":"Philadelphia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-131a41644901011a4e005943090f0a472443170d1a000a665c434c030a03421a546138130103104300482412444a5a485f443f1c481055001c4123060b41130d0416445f3f644901011a4e00594329020d0216535425081d4b4c585f2f341d0143014317482c0f090447111a6b23584459584e104f21501a4511695057505611/b5401b297df84f2091dcdf85e6802491.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Children’s Hospital of Philadelphia","salary":"$139220 - 184460 per year","summary":". (Required proficiency) Licenses and Certifications Certified Information Security Manager (CISM) - Information Systems Auditand Control Association (ISACA) - upon hire - Preferred or Certified Information Systems Auditor (CISA) - Information Systems...","source":"careerjet","job":"131a41644901011a4e005943090f0a472443170d1a000a665c434c030a03421a546138130103104300482412444a5a485f443f1c481055001c4123060b41130d0416445f3f644901011a4e00594329020d0216535425081d4b4c585f2f341d0143014317482c0f090447111a6b23584459584e104f21501a4511695057505611-b5401b297df84f2091dcdf85e6802491","posted":"03-Aug-25","jobTitle":"Manager Identity and Access Management Product Owner"},"21423994":{"jobPath":"/jobs/21423994/it-manager-netsuite-specialist","source":"naylor","job":"21423994","jobTitle":"IT Manager - NetSuite Specialist"},"194e416e54060a1c072745001d1307131c00390907124d4e4f2f7e010c1b551d541a482c0f090447111a6b36444c544348011d074913002e090f0f000052762b10114f591d7e48071a1c4e0059613b141e170a5200482412444a5a485f655e57104011-683195ced6aeba400922f3fb4e41b484":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-194e416e54060a1c072745001d1307131c00390907124d4e4f2f7e010c1b551d541a482c0f090447111a6b36444c544348011d074913002e090f0f000052762b10114f591d7e48071a1c4e0059613b141e170a5200482412444a5a485f655e57104011/683195ced6aeba400922f3fb4e41b484.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Arconic","salary":"","summary":" with exposure to operational technology (OT) environments. Active security certification (e.g., CISSP, CISM, CISA, Security...","source":"careerjet","job":"194e416e54060a1c072745001d1307131c00390907124d4e4f2f7e010c1b551d541a482c0f090447111a6b36444c544348011d074913002e090f0f000052762b10114f591d7e48071a1c4e0059613b141e170a5200482412444a5a485f655e57104011-683195ced6aeba400922f3fb4e41b484","posted":"21-Jun-25","jobTitle":"Cyber Security Engineering & Support Manager"},"21548120":{"jobPath":"/jobs/21548120/firewall-security-engineer-fortinet-cloud","source":"naylor","job":"21548120","jobTitle":"Firewall Security Engineer (Fortinet & Cloud)"},"1d4f416479443c0b4401520a1c184e2a044e150f0c012862690d6005010f401152613b040d1217490011493e4b455c4a48166d27735473060b141c0e115976213d53637f3c1c14555b59-b36d77d8c8b4d053fc6d820f80042bef":{"location":"Conshohocken, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1d4f416479443c0b4401520a1c184e2a044e150f0c012862690d6005010f401152613b040d1217490011493e4b455c4a48166d27735473060b141c0e115976213d53637f3c1c14555b59/b36d77d8c8b4d053fc6d820f80042bef.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"NSM Insurance Group, LLC","salary":"","summary":" for compliance monitoring and reporting. Relevant certifications preferred (e.g., CISA, CISM, CRISC, CISSP). Excellent...","source":"careerjet","job":"1d4f416479443c0b4401520a1c184e2a044e150f0c012862690d6005010f401152613b040d1217490011493e4b455c4a48166d27735473060b141c0e115976213d53637f3c1c14555b59-b36d77d8c8b4d053fc6d820f80042bef","posted":"01-Aug-25","jobTitle":"IT Security GRC Manager"},"21567857":{"jobPath":"/jobs/21567857/it-technician","source":"naylor","job":"21567857","jobTitle":"IT Technician"},"21581864":{"jobPath":"/jobs/21581864/cyber-security-analyst","source":"naylor","job":"21581864","jobTitle":"Cyber Security Analyst"},"4e4f41644302001c4a15540a070f4e341c53000d0453794e5e585f0d1b17073b460501020b1567691a0e0601474a4944420a4f3d42175511011517472a4612010a16582974434b0b1d034600490c06413d1e1654110549204f48485f4410166c740d53170d0c4e340043011a0007530b724b4b0d0c0b557673060b141c0e115954270f154348585f2c55565b1147-180ae0b86dbf112e1e6c3eb559bbf186":{"location":"Mechanicsburg, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4e4f41644302001c4a15540a070f4e341c53000d0453794e5e585f0d1b17073b460501020b1567691a0e0601474a4944420a4f3d42175511011517472a4612010a16582974434b0b1d034600490c06413d1e1654110549204f48485f4410166c740d53170d0c4e340043011a0007530b724b4b0d0c0b557673060b141c0e115954270f154348585f2c55565b1147/180ae0b86dbf112e1e6c3eb559bbf186.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Arlo Solutions","salary":"","summary":", CISM, CISA, CAP, or equivalent are highly desirable. AAP Statement We are proud to be an Affirmative Action and Equal...","source":"careerjet","job":"4e4f41644302001c4a15540a070f4e341c53000d0453794e5e585f0d1b17073b460501020b1567691a0e0601474a4944420a4f3d42175511011517472a4612010a16582974434b0b1d034600490c06413d1e1654110549204f48485f4410166c740d53170d0c4e340043011a0007530b724b4b0d0c0b557673060b141c0e115954270f154348585f2c55565b1147-180ae0b86dbf112e1e6c3eb559bbf186","posted":"06-Jun-25","jobTitle":"Information System Security Officer (ISSO)"},"4b4d41644302001c4a15540a070f4e340043011a0007530b704c4305080b557673060b141c0e11595425081d4b4c585f2f2d010848064d021c0801094573110b1c01435f442f640a090155194117010e004728411a090e1658296e5f0d290e0046134511695057515717-8b749a1d0fe3450db127fa7092d965e1":{"location":"Murrysville, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4b4d41644302001c4a15540a070f4e340043011a0007530b704c4305080b557673060b141c0e11595425081d4b4c585f2f2d010848064d021c0801094573110b1c01435f442f640a090155194117010e004728411a090e1658296e5f0d290e0046134511695057515717/8b749a1d0fe3450db127fa7092d965e1.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Philips","salary":"$117000 per year","summary":" Framework, IEC 62443/NIST 800:23. Preferred to have a CISSP, CISM, CISA, CIPP certification. Your skills include thorough...","source":"careerjet","job":"4b4d41644302001c4a15540a070f4e340043011a0007530b704c4305080b557673060b141c0e11595425081d4b4c585f2f2d010848064d021c0801094573110b1c01435f442f640a090155194117010e004728411a090e1658296e5f0d290e0046134511695057515717-8b749a1d0fe3450db127fa7092d965e1","posted":"09-Jul-25","jobTitle":"Sr. Information Security Manager"},"1c4a41644302001c4a15540a070f4e340043011a0007530b7c434c08161d5376690d0e0e1c0a04541d070753794e5e585f0d1b170726491003633d02065506011d0a0a79545e46442e00461859101c632709034f060508074344530d7e010c1b551d541a6a3307140e003506081f5358492c1c5d585a16-449f40dd8d18b34c5b44b63734c89d0c":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1c4a41644302001c4a15540a070f4e340043011a0007530b7c434c08161d5376690d0e0e1c0a04541d070753794e5e585f0d1b170726491003633d02065506011d0a0a79545e46442e00461859101c632709034f060508074344530d7e010c1b551d541a6a3307140e003506081f5358492c1c5d585a16/449f40dd8d18b34c5b44b63734c89d0c.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Wabtec","salary":"","summary":" management. ISO 27001 standard knowledge is highly desirable. Governance and Risk Certification a plus (CRISC, CISM, CISA...","source":"careerjet","job":"1c4a41644302001c4a15540a070f4e340043011a0007530b7c434c08161d5376690d0e0e1c0a04541d070753794e5e585f0d1b170726491003633d02065506011d0a0a79545e46442e00461859101c632709034f060508074344530d7e010c1b551d541a6a3307140e003506081f5358492c1c5d585a16-449f40dd8d18b34c5b44b63734c89d0c","posted":"21-Jun-25","jobTitle":"Risk Analyst - Information Security"},"21440808":{"jobPath":"/jobs/21440808/security-operations-center-soc-analyst","source":"naylor","job":"21440808","jobTitle":"Security Operations Center (SOC) Analyst"},"4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50-a6c9285e51d5b839eb3b0e8cd270bd72":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50/a6c9285e51d5b839eb3b0e8cd270bd72.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"VDart","salary":"","summary":" best practices and frameworks (e.g., ITIL, COBIT). Drive automation and innovation in service delivery. Risk & Compliance...","source":"careerjet","job":"4b4d41694817041a4804002e090f0f00005276240c124e0b704c4305080b55766d02060009021722300d1a185e444d2f61010e0a264519545c50-a6c9285e51d5b839eb3b0e8cd270bd72","posted":"09-Aug-25","jobTitle":"Desktop Lead/Manager"},"4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f-5ac6e52fcff2066effaefc58cdc32fdd":{"location":"King of Prussia, PA","jobPath":"https://jobviewtrack.com/en-gb/job-4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f/5ac6e52fcff2066effaefc58cdc32fdd.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Universal Health Services","salary":"","summary":" to the COSO/COBIT Framework and the Standards for the Professional Practice of Internal Auditing published by the Institute...): Certified Public Accountant (CPA), Certified Information Systems Auditor (CISA), Certified Information Security Systems...","source":"careerjet","job":"4e1a416944160a0d531b5243210f1a02174e150449325f4f54592f2d3b4e6601440a1c412a0e1745171c06012862690d640a1b0b551a410f48201b030c5476291c17435f1d694c100e4e661a410f1115070416223506081f535f544e5e442b075511431707134e2304541569584a1e180f-5ac6e52fcff2066effaefc58cdc32fdd","posted":"04-Jul-25","jobTitle":"Assistant Director - IT Internal Audit & Data Analytics"},"21463860":{"jobPath":"/jobs/21463860/director-of-it","source":"naylor","job":"21463860","jobTitle":"Director of IT"},"1c4a416479442e1b431d5443250000060245066a20270a665c434c030a1c253d744329140a0e1122351d0d1a5e0b704c4305080b5576693748283a665419445f5c-2b74350bb34f39a7552aef2646afe44c":{"location":"Canonsburg, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1c4a416479442e1b431d5443250000060245066a20270a665c434c030a1c253d744329140a0e1122351d0d1a5e0b704c4305080b5576693748283a665419445f5c/2b74350bb34f39a7552aef2646afe44c.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Viatris","salary":"","summary":", COBIT, COSO, ITIL methodologies, Sarbanes-Oxley requirements and IT Auditing standards and practices; applying knowledgefollowing professional certifications: CA, CPA, or CISA. At Viatris, we offer competitive salaries, benefits and an inclusive...","source":"careerjet","job":"1c4a416479442e1b431d5443250000060245066a20270a665c434c030a1c253d744329140a0e1122351d0d1a5e0b704c4305080b5576693748283a665419445f5c-2b74350bb34f39a7552aef2646afe44c","posted":"24-Jul-25","jobTitle":"Manager, IT Audit"},"1248416479443c0b4401520a1c184e260b4118111a0728784f0d7e010c1b551d541a482000060959071c6b3a7e0b6e484e111d07530d22300d021b150c540d48281d4b47445e5966263a07354e0204181d1364114d505d42-4aaa0e98d14a75676b1f48bcb10b7204":{"location":"Scranton, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1248416479443c0b4401520a1c184e260b4118111a0728784f0d7e010c1b551d541a482000060959071c6b3a7e0b6e484e111d07530d22300d021b150c540d48281d4b47445e5966263a07354e0204181d1364114d505d42/4aaa0e98d14a75676b1f48bcb10b7204.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"ID Logistics","salary":"","summary":" such as: ISC2 Series (CC, CISSP, SSCP, CGRC, ISSAP, ISSMP, ISSEP GIAC Series ISACA Series (ISACA, CISM, CRISC, CISA) EC-Council...","source":"careerjet","job":"1248416479443c0b4401520a1c184e260b4118111a0728784f0d7e010c1b551d541a482000060959071c6b3a7e0b6e484e111d07530d22300d021b150c540d48281d4b47445e5966263a07354e0204181d1364114d505d42-4aaa0e98d14a75676b1f48bcb10b7204","posted":"09-Aug-25","jobTitle":"Sr. IT Security Analyst"},"21458020":{"jobPath":"/jobs/21458020/security-information-and-event-management-siem-lead","source":"naylor","job":"21458020","jobTitle":"Security Information and Event Management (SIEM) Lead "},"1b18417f4417044e661a410f11121a652659160d1b004f48485f4410164e661a410f11121a653749070349304545495f42081c6c640d42061a120b0410521d1c105378424e462f25010f4b0d5317695057505111-0f1f94931a08ac3afb2cde3aac126a60":{"location":"Pittsburgh, PA","jobPath":"https://jobviewtrack.com/en-gb/job-1b18417f4417044e661a410f11121a652659160d1b004f48485f4410164e661a410f11121a653749070349304545495f42081c6c640d42061a120b0410521d1c105378424e462f25010f4b0d5317695057505111/0f1f94931a08ac3afb2cde3aac126a60.html?affid=f74b1b169ff653e7ebdd310c58e7185b","employer":"Wabtec","salary":"$77400 - 110300 per year","summary":" knowledge is highly desirable. Governance and Risk Certification a plus (CRISC, CISM, CISA, or CISSP) What will your typical...","source":"careerjet","job":"1b18417f4417044e661a410f11121a652659160d1b004f48485f4410164e661a410f11121a653749070349304545495f42081c6c640d42061a120b0410521d1c105378424e462f25010f4b0d5317695057505111-0f1f94931a08ac3afb2cde3aac126a60","posted":"20-Jun-25","jobTitle":"Risk Analyst - Cybersecurity Risk & Controls"}}
The Cyber Security Analyst I supports Dollar Bank’s ability to protect the confidentiality, integrity, and availability of its information assets. The Cyber Security Analyst I serves as a data privacy champion by initiating, monitoring, and validating security controls to help ensure compliance with data privacy regulations. The Cyber Security Analyst I will support data privacy and information security practices across all lines of business, collect and prepare security metrics and performance indicators for management, and analyze security alerts
Qualifications:
Associate’s Degree in Information Technology, Computer Science or related work experience required.
Ability to understand processes that support security activities.
Ability to review security metrics and determine if escalation is required.
Basic understanding of network systems and information security concepts.
Ability to build strong relationships across the organization at all levels.
Experience with security software (i.e. anti-malware products by Symantec, McAfee, etc.).
Willing to earn certifications and participate in continuing education and coursework.
Working knowledge of Visio, Word, and Excel preferred.
Experience working independently and in a team-orientated, collaborative environment.
Excellent interpersonal and communication skills.
Principal Activities and Duties:
Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from international or inadvertent access or destruction.
Review log files for endpoint security, email security products, web screening products, including updates and releases.
Documentation of procedures, processes, standards for all security documents.
Perform Security Incident Response activities, coordinate with other departments to record and report incidents.
Conduct operating systems, application, and database vulnerability assessments (to include system configuration checks).
Perform all procedures necessary to ensure the safety of information systems assets and to protect systems from intention or inadvertent access or destruction.
Assist in security awareness activities.
Monitor and analyze Intrusion Detection Systems (IDS) to identify security issues for remediation.
Recognizes potential, successful, and unsuccessful intrusion attempts and compromises thorough reviews and analyses of relevant event detail and summary information. Be able to trend results accurately.
Perform required patching, including vendor updates and security patches, validation scanning as directed by applicable policy and guidance.
Analyze audit security incident logs for individual or multiple networked devices for sensitive information, unauthorized processes and unauthorized network connections.
Perform security analysis and risk management assessments with guidance.
Maintain current knowledge of relevant technology as assigned.
Participate in special projects as required.
All employees have the responsibility and the accountability to serve as risk managers for their businesses by understanding, reporting, responding to, managing, and monitoring the risk they encounter daily as required by Dollar Bank’s risk management program. Compliance with regulatory laws and company procedures is a required component of all position descriptions.
For more than 169 years, Dollar Bank has grown to become a large, full service, regional bank committed to providing the highest quality of banking services to individuals and businesses. As an independent community bank, we can focus on our customers and communities.
Every day we invest in our employees by providing an inclusive atmosphere that fosters growth and career development. We strive to empower our customers to succeed in every aspect of their financial lives through our personalized banking products and services. We aim to inspire and support our communities by providing resources that promote economic development. Our customer-centric approach, along with exceptional service, drives our mission and energizes our future growth.
Dollar Bank is the largest mutual bank in the country and operates more than 90 locations throughout Pennsylvania, Ohio, and Virginia with over 1,500 employees. Dollar Bank (www.dollar.bank) is headquartered in Pittsburgh, Pennsylvania.