At ERCOT, our diverse and dynamic work environment provides a platform on which employees can work together to build the future of the Texas power grid and wholesale market utilizing the latest technologies and resources. We encourage you to join our talented, dedicated workforce to develop world-class solutions for today and tomorrow's energy challenges while learning new skills and growing your career.ERCOT is committed to fostering diversity and inclusion at all levels of our company. It is the cornerstone of our corporate values of accountability, leadership, innovation, trust, and expertise. We accept and celebrate those that join us and recognize that individuals with a wide variety of talents, ideas, and experiences propel the innovation that drives our success. A diverse and inclusive workforce strengthens us and allows for a collaborative environment to solve the challenges that face our industry today and in the future.ERCOT offers the flexibility to work both in and out of the office within the state of Texas, providing our employees with an enhanced work life balance.Join our team as a Cyber Security Analyst where you will provide support in solving all phases of a large and complex Critical Infrastructure Security (CIS) program. You provide a full range of analytic duties using knowledge of multidisciplinary security concepts, principles and practices applicable to securityadministration. Respond to, and reports on, IT security incidents, providing initial assessment of impact severity and types of incidents being addressed. Perform periodic operating system and application security assessments of simple-to-moderate complexity and review for evidence of vulnerability or compromise and assisting with the implementation of resolution. Monitor computing resources for evidence of compromise and reports security incidents.Essential Job Duties and Tasks• Implements, monitors and maintains preventive and detective controls• Monitors computing resources for evidence of compromise and report security incidents• Analyzes compromised computing resources of routine to moderate complexity, to assist in improving security design and policycompliance, and to understand and document new threat profiles• Develops and implements mitigation strategies for threat reduction based on monitoring of IT systems• Researches, analyzes, designs, tests and implements new or vendor supplied security software solutions• Provides up to date documentation and procedures on security software product administration• Assists in the development of technical security standards to support policies, including creating, coordinating and monitoringstandards and incident investigation procedures• Works as a member of the Incident Response Team and perform analysis of security breaches• Studies and grows current knowledge of security issues• Supports the development, documentation, deployment, review and maintenance of information security policies• Communicates information security requirements and principle• Ensures compliance with security related regulatory and corporate requirements• Designs cyber security monitoring program, including technologies and processes• Investigates and analyzes computing resources for evidence of compromise and reports security incidents• Enforces security policies and procedures by administering and monitoring security profiles, reviews security violation reports and investigates possible security exceptions, updates, and maintains and documents security controls• Functions as a member in the security group's Incident Response Team• Analyzes complex compromised computing resources to improve security design and policy compliance, and to anticipate and prevent new threat profiles• Develops and defends new technical security standards to support policies, including creating, coordinating and monitoring standards and incident investigation procedures• Performs periodic and complex operating system and application security assessments to determine the likelihood of vulnerability or compromise, and prepares possible resolutions for implementation• Analyzes security breaches• Expands expert knowledge of security issues• Reports issues to the department personnel responsible for the resource• Produces and presents compelling security-related training content• Creates and consistently delivers awareness material promoting security awareness• Serves as a mentor for junior security teammatesREQUIRED EXPERIENCERequires minimum 3 years related work experience in excess of degree requirementsEDUCATION
...thousands of discounts and other tools to help you save money and time. Adjust your work, not your life. Deliver only when you want... ...iPhone or Android app Self-employed / No-contract / Temporary / Part-time / Shift-work Who can deliver for Amazon Flex? You must...
...Work with people from all over the world! Employee-only RIDE nights, GAME nights, and FREE FOOD events! Referral bonuses - work... ...your future As a scenic carpenter you will: ~ Assist in set construction. ~ Assist in prop and attraction builds. ~Responsible for...
...Epic Travel Staffing is hiring a Travel RN - HEMONC Shift : Days / 8a-4:30p (8x5) 40 hours per week Length : 13 weeks No Call No Float No Weekends Requirements: ~ DC License ~2 Years Experience ~ Pedi/Adolescent outpt Infusions...
...PROVIDE you with all the CONDITIONS you could make big money Lease drivers Owner operators Team company drivers We OFFER Solo... ...Weekly income: solo - $2500-3500 team $3000-4000+ Amazon, UPS, FedEx, JB Hunt Drop and hook Well-maintained trucks 2019-...
...Job Title: Clinical Data Manager Location: Cambridge MA 02139 Duration: 12+ Months POSITION SUMMARY We are looking for a self-directed professional to support Digital Health Technology [DHT] (wearable sensors) and imaging components set-up and monitoring...