Sort by
Refine Your Search
-
the design, development, and implementation of the university’s overall cybersecurity architecture framework. Develops secure enterprise security architectures (e.g., cloud, network, platforms, operation
-
cybersecurity architecture guidelines and industry best practices across all technology environments (e.g., cloud, network, OT, IoT). Provides input on cybersecurity engineering resource planning and assists in
-
, regulations, and internal policies. Represents USCCU at industry events and associations to stay informed on market developments and build professional networks. Encourages a workplace culture where all
-
contracted payer negotiations, account management and network development. Possesses recognized leadership and strong organizational and analytical skills and will actively assist the Administration Department
-
forensic analysis on endpoints, servers, and network data, resolving incidents by identifying root causes and solutions; implements remediation actions as necessary. Works with cyber defense team members
-
executing security strategies and ensuring the protection of university systems, networks and data from cyber threats. Collaborates with senior leadership to align security initiatives with university goals
-
major incidents. Works with senior cyber defense analysts to analyze security logs, network traffic, and other data sources to identify indicators of compromise (IOC) and malicious activity. Forensically
-
license. Current CPR certification. Excellent clinical, communication, and patient care skills. Why Join USC? Health benefits for you and your family, plus access to the university medical network
-
attention to detail. Why Join USC? Comprehensive health benefits for staff and dependents with access to USC’s renowned medical network. Eligibility for retirement plans. Tuition benefits for staff and their
-
Analyst, Attack Surface Management (ASM) responsible for identifying, assessing, and mitigating security vulnerabilities across our organization's systems, networks, and applications and supports attack