- Paycom Online (Oklahoma City, OK)
- The Application Security Analyst III position exists to protect the security posture of the Paycom application through tasks such as advanced web ... tasks include work to develop or improve existing projects that contribute to application security , and user education. **RESPONSIBILITIES** + Perform and lead… more
- General Dynamics Information Technology (Las Vegas, NV)
- …of related experience **Job Description:** ** Security Training & Integration Analyst ** ( **STIA III )** General Dynamics Information Technology is pursuing ... an experienced candidate to fill the role of Security Training & Integration Analyst to assist...leading capabilities in digital modernization, AI/ML, Cloud, Cyber and application development. Together with our clients, we strive to… more
- ONEOK, Inc (Tulsa, OK)
- …Sustainable operations. Environmentally responsible. Employee focused.** **JOB SUMMARY** We're looking for a Security Analyst III to join the Enterprise ... + Knowledge of: IT infrastructure environments, local and wide-area networks and application security needs + Ability to: manage small to medium information … more
- Hyundai Autoever America (Savannah, GA)
- …specific to MES, it can be valuable for an MES System Analyst III involved in ensuring data integrity, security , and compliance within manufacturing systems. ... MES System Analyst III Location - Savannah, GA...MES System Analyst III Location - Savannah, GA CBU : HMGMA...Maria DB and Tibero, Oracle 11g, SQL server knowledge, Application Server (Windows and Linux), RHEL 9.X., RedHat, Debian,… more
- Battelle Memorial Institute (Chantilly, VA)
- …Battelle Cyber: https://www.youtube.com/watch?v=XqMuKsqH9wc Battelle's Cyber team is seeking a **Network Security Analyst ** to lead a team to collect ... necessary based on program or customer needs. A Network Security Analyst at Battelle is an expert...Directory. + Familiarity with scripting languages to facilitate tool application , eg, PowerShell, Python. + Ability to capture and… more
- The Mount Sinai Health System (New York, NY)
- **JOB DESCRIPTION** The Applications Analyst III supervises and provides technical guidance to the staff in the development of specifications for new or revised ... specify the complex business requirements and processes, and in the application design, testing and implementation process (eg, diverse development platforms,… more
- Washington Metropolitan Area Transit Authority (VA)
- …with or without reasonable accommodations. **Summary** The Cybersecurity Analyst III is responsible for identifying and remediating security threats. The ... Cybersecurity Analyst III (Purple) Job ID: 240271...Purple Team testing; including network penetration, web and mobile application testing, source code reviews, threat analysis, wireless network… more
- LA Care Health Plan (Los Angeles, CA)
- Enterprise Resource Planning Analyst III Job Category: Accounting/Finance Department: Finance Services Location: Los Angeles, CA, US, 90017 Position Type: Full ... business processes and requirements, reviews the functional specifications and application design documents, writes test plan, tests scripts and...but is not limited to Billing. The ERP Billing Analyst III is also responsible for the… more
- Tucson Electric Power (Tucson, AZ)
- …to the UNS Energy Code of Conduct and the related Policies and Procedures. Programmer Analyst III + Responsibilities of Programmer Analyst II + Designs and ... **Programmer Analyst II- III ** Company **Tucson Electric Power**...proposed systems. + Collaborate with IS infrastructure, network, and security teams to develop technical requirements necessary to implement… more
- Hartford HealthCare (Farmington, CT)
- …moment.* **Job:** **Information Technology* **Organization:** **Hartford HealthCare Corp.* **Title:** *ITS Application Analyst III / IS Finance* ... application requirements and performance goals. 4. Follow good security coding practices to ensure the application ...good security coding practices to ensure the application is free of most common coding vulnerabilities. 5.… more