in third-party/vendor risk auditing, including due diligence, contract compliance, and risk assessments. 3 years Skilled... 27001 Lead Auditor. Specific Skills: IT & Cybersecurity Auditing (NIST, ISO, PCI-DSS, SOC 2) Vendor Risk Management...
of current data protection laws, regulatory compliance, and third-party risk management practices. 5 Required Technical IT..., evidence-based recommendations. 4 Required Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity...
Job Title: IT Auditor II and cybersecurity Location: Austin, TX (Hybrid ) Duration: 5+ Months Mode of Interview... solutions. 4+ years of hands-on third-party/vendor risk auditing experience. 3+ years of reviewing security policies...
sound, evidence-based recommendations. Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity..., regulatory compliance, and third-party risk management practices. Technical IT auditing: Strong ability to evaluate security...
to extension Review vendor contracts, SLAs, and other IT and cybersecurity contractual requirements to confirm compliance..., with working knowledge of current data protection laws, regulatory compliance, and third-party risk management practices. 5...
a highly skilled Experienced IT Auditor with 5+ years of expertise in evaluating vendor cybersecurity controls, contractual... compliance, and third-party risk management. Skilled in auditing against NIST, ISO 27001, PCI-DSS, and SOC 2 frameworks...
gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk auditing..., and other IT and cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the design...
, and third-party risk management practices. 5 Required Technical IT auditing: Strong ability to evaluate security controls... security gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk...
of current data protection laws, regulatory compliance, and third-party risk management practices. 5 Required Technical IT..., evidence-based recommendations. 4 Required Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity...
gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk auditing..., and other IT and cybersecurity contractual requirements to confirm compliance with contractual obligations. Evaluate the design...