States > Georgia > Atlanta > Security Identity Management (IDM)

Security Identity Management (IDM) jobs in Georgia
($) : Market
Please send me the following information if you are interested in this opportunity. Updated resume Matching skills summary with years of experience in each skill above Full Legal Name Current Location: Availability Hourly Rate Contact details 2 Professional References Valid Copy of GC or EAD (if you are not a Citizen) Location: Duluth, GA Duration: 9+ months, ongoing Needed for submission: Visa status, country of origin Job Description: CA API Gateway Engineer
Apr-18-18
Apply
[Already Applied]
ROLE Network Security Firewall Engineer for Long Term Project (Requisition ID: 53235) LOCATION Atlanta GA DURATION LONG TERM RATE DOE DIRECT CLIENT YES INTERVIEW TYPE In-Person Only Local candidates strongly preferred ALL candidates MUST be able to attend a personal interview, NO phone interviews, NO Skype, NO exceptions State Experience Highly Preferred U.S. Citizens and those authorized to work in the U.S. are encouraged to apply Note: For H1
Apr-10-18
Apply
[Already Applied]
($) : MARKET
Lead Information Security Regulatory Compliance Analyst - Atlanta, GA Direct Hire - Must be GC or US Citizen Maintain a continuous state of compliance across multiple frameworks and regularly monitor the effectiveness of the compliance program. Responsible for assessing and ensuring compliance for all campus entities against applicable regulations and standards. Ensure security controls are operating effectively, conduct information security audits and risk assessments, and design risk mit
Apr-02-18
Apply
[Already Applied]
($) : MARKET
Senior Information Security Regulatory Compliance Analyst - Atlanta, GA Direct Hire - Must be GC or US Citizen Maintain a continuous state of compliance across multiple frameworks and regularly monitor the effectiveness of the compliance program. Responsible for assessing and ensuring compliance for all campus entities against applicable regulations and standards. Ensure security controls are operating effectively, conduct information security audits and risk assessments, and design risk
Apr-02-18
Apply
[Already Applied]