27001 Lead Auditor. Specific Skills: IT & Cybersecurity Auditing (NIST, ISO, PCI-DSS, SOC 2) Vendor Risk Management... laws and third-party risk management. 5 years Strong technical IT auditing skills, including evaluation of security...
Job Title: IT Auditor II and cybersecurity Location: Austin, TX (Hybrid ) Duration: 5+ Months Mode of Interview... solutions. 4+ years of hands-on third-party/vendor risk auditing experience. 3+ years of reviewing security policies...
, evidence-based recommendations. 4 Required Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity... of current data protection laws, regulatory compliance, and third-party risk management practices. 5 Required Technical IT...
sound, evidence-based recommendations. Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity..., and third-party risk management practices. Technical IT auditing: Strong ability to evaluate security controls such as network...
impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk auditing: Hands...Position: IT Auditor II Location: Austin, TX 78701 - HYBRID Duration: 5 months Contract with possibility...
a highly skilled Experienced IT Auditor with 5+ years of expertise in evaluating vendor cybersecurity controls, contractual...Job Title - IT Auditor II Work Location- Austin, Tx Work Timings- 8 AM - 5 PM CST Position Summary: We are seeking...
gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk auditing... to interpret legal and technical language in vendor contracts to ensure proper implementation of SLAs, IT, and cybersecurity...
, and third-party risk management practices. 5 Required Technical IT auditing: Strong ability to evaluate security controls... security gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk...
, evidence-based recommendations. 4 Required Third-party/vendor risk auditing: Hands-on experience conducting cybersecurity... of current data protection laws, regulatory compliance, and third-party risk management practices. 5 Required Technical IT...
gaps, assess risk impact, and make sound, evidence-based recommendations. 4 Required Third-party/vendor risk auditing...-party risk management practices. 5 Required Technical IT auditing: Strong ability to evaluate security controls...