Try another search here
Not your type of job? Try your own search. Ok, got it

Want to receive similar jobs about "Info Access Systems" by email?

Alert me

FiltersFilter search results

  • City
    • (889)
    • (604)
    • (243)
    • (130)
    • (115)
    • View more »
    • (98)
    • (64)
    • (63)
    • (62)
    • (51)
    • (29)
    • (27)
    • (18)
    • (10)
    • (9)
    • (7)
    • (7)
    • (7)
    • (6)
    • (6)
    • (6)
    • (5)
    • (5)
    • (4)
    • (4)
  • State
    • (1676)
    • (1029)
    • (626)
    • (158)
    • (137)
    • View more »
    • (53)
    • (35)
    • (15)
    • (13)
    • (12)
    • (10)
    • (6)
    • (3)
    • (3)
    • (3)
    • (1)
    • (1)
  • Category
    • (1680)
    • (950)
    • (238)
    • (148)
    • (108)
    • View more »
    • (94)
    • (82)
    • (63)
    • (53)
    • (45)
    • (44)
    • (44)
    • (32)
    • (27)
    • (27)
    • (19)
    • (18)
    • (14)
    • (14)
    • (14)
    • (12)
    • (9)
    • (8)
    • (7)
    • (7)
    • (6)
    • (6)
    • (3)
    • (3)
    • (2)
    • (1)
    • (1)
    • (1)
    • (1)
  • Minimum Level of Studies
    • (3781)
    • (3767)
    • (2915)
    • (2781)
    • (2781)
    • View more »
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2781)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
    • (2698)
  • Working Shift
    • (3781)
  • Posting period
    • (324)
    • (439)
    • (1069)
    • (1340)
    • (1499)
    • View more »
    • (1655)
Sort by:
  • Â 5+ years of experience in Security domain at least 2 years in Identity & Access Management. - Well versed with support processes - Should have design, implementation and support experience on Identity Management products like Oracle IAM

  • Â 5+ years of experience in Security domain at least 2 years in Identity & Access Management. - Well versed with support processes - Should have design, implementation and support experience on Identity Management products like Oracle IAM

  • (Master Data governance) and authoritative systems. Strong level of relational database concepts, ability to write/read complex SQL queries and scripts against highly abstracted model Ability to map logical / physical data models Advanced level in general reporting / Analytic through use of tool

  • (Master Data governance) and authoritative systems. Strong level of relational database concepts, ability to write/read complex SQL queries and scripts against highly abstracted model Ability to map logical / physical data models Advanced level in general reporting / Analytic through use of tool

  • (Master Data governance) and authoritative systems. Strong level of relational database concepts, ability to write/read complex SQL queries and scripts against highly abstracted model Ability to map logical / physical data models Advanced level in general reporting / Analytic through use of tool

  • Information Security Specialist (Associate) (RFT - Risk & Finance Technology) Continual enhancement of the confidentiality, integrity and availability of data and systems through a robust information security agenda is a key strategic objective of JP Morgan Chase. Cyber security and access

  • Information Security Specialist (Associate) (RFT - Risk & Finance Technology) Continual enhancement of the confidentiality, integrity and availability of data and systems through a robust information security agenda is a key strategic objective of JP Morgan Chase. Cyber security and access

  • Remediation Team is responsible for ensuring that users have access to systems which are appropriate to their role and approved for their use through pro-active monitoring and reporting of exceptions to management. The Access Reconciliation Team is specifically responsible for comparing current application

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • platforms and systems; ensuring access is granted in accordance with the Logical Access Control policy, established standards and procedures. Knowledge of the various lines of business supported is helpful. Analyze requests for potential risk before action. Escalating, rejecting and querying requests where

  • Recertification experience across platform, application and/or database systems · Control related experience (e.g., Risk Management, Access Administration, Change Control, or Contingency Planning) · Superb oral and written communication skills · Flexible with regard to working shifts; On-Call & weekends; Overtime

  • Recertification experience across platform, application and/or database systems · Control related experience (e.g., Risk Management, Access Administration, Change Control, or Contingency Planning) · Superb oral and written communication skills · Flexible with regard to working shifts; On-Call & weekends; Overtime

  • Recertification experience across platform, application and/or database systems · Control related experience (e.g., Risk Management, Access Administration, Change Control, or Contingency Planning) · Superb oral and written communication skills · Flexible with regard to working shifts; On-Call & weekends; Overtime

Want to receive similar jobs about "Info Access Systems" by email?

Alert me
Go to Top