Lead or contribute to risk and control design assessments for an assigned business application, business portfolio, and overall enterprise, as well as risk…
Using threat detection, analysis, correlation capabilities and tools, this role supports the development of a comprehensive picture of the short to long term…
The incumbent will lead and support others with the development of reporting, monitoring key trends and defining KPI and KRI to current and emerging fraud…
TD Information Security covers the development and management of security strategies, policies and programs to assess, prioritize, and mitigate business risk…
Provide guidance with issues and events within the region, perform review of control monitoring plans and engaging with senior management and external…
That individual will partner with the first line of defense (Technology and other business units as applicable) in identifying, reporting, and mitigating…
Provide input, analysis and / or perspective in the design, development, customization, testing, implementation, communication, maintenance and assessment of…
Oversee the development and implementation of an organization-wide security awareness program; Flair Airlines offers a competitive compensation package…
Serve as a third party risk assessor, performing risk assessments by evaluating third party attestations, performing control design review, and control…
TD Information Security covers the development and management of security strategies, policies and programs to assess, prioritize, and mitigate business risk…
As a member of the Security Analytics team within the Chief Security Office at TELUS you will be part of a growing national team that provides monitoring and…
Participate in the software development lifecycle by writing code, tests, documentation, attending daily stand up and other meetings; and communicating…
Build and maintain relationships, and during incidents work with internal stakeholders throughout the incident management lifecycle (i.e., Business LoBs,…
Build and maintain relationships, and during incidents work with internal stakeholders (i.e., Business LoBs, Technology groups, Fusion/cyber teams (CSOC/CSIRT),…