States > Georgia > Oakwood > Security Identity Management (IDM)

Security Identity Management (IDM) jobs in Georgia
Please find my Direct Client requirement for your consideration, Position: Information Security Regulatory Compliance Assessor Location: Atlanta, GA. (Local to GA Duration: 12 Months. Rate is: Open. Job Description: - The Georgia Institute of Technology Cyber Security team is seeking FTE assistance in performing IT asset assessments in order to achieve compliance with new federal cyber security regulations. Candidates should have a strong background in technology and audi
Jul-20-17
Apply
[Already Applied]
Position : Consultant-TLS Reporting Location : Atlanta or Omaha Job Type : Contract Start Date : Immediate & URGENT Job Description Responsible for TLS (Transport Layer Security) reporting 8+ years of experience in Rest API development using Python Experience building RESTful APIs, architecting complex systems with batch and real-time workloads, monitoring and instrumenting production systems Scripting knowledge in PHP, Ruby Strong
Jul-14-17
Apply
[Already Applied]
Alpharetta, GA
($) : Market
Sr. Information Security Analyst – Contract Atlanta, GA The ideal candidate should have experience in understanding, documenting and coordinating SOX ITGC control activities, evidence gathering and evaluation thereof in multi-platform environment including Windows, Linux, Oracle, SQL Server and MongoDB. The focus of desired expertise is in the area of information security, primarily access. Additionally the ideal candidate should have excellent verbal and written communication skills neces
Jul-10-17
Apply
[Already Applied]
Atlanta, GA
($) : Market
Contract to perm option Green card Citizen This role supports the IT Governance Risk & Compliance (GRC) program which includes risk management, compliance management, assessments, and security awareness. This position is specifically responsible for assisting in the development or revision of appropriate information security policies, standards, procedures, checklists, and guidelines using generally-recognized security concepts tailored to meet the requirements of the organization. Unde
Jun-27-17
Apply
[Already Applied]