Job Description

Requirements

Description and Requirements

Position Summary

To perform end to end IT third party cyber risk assessments, which includes Vendor Due Diligence, Risk Identification and Analysis, Archer Management, Reviewin...

Apply for this Position

Ready to join Confidential? Click the button below to submit your application.

Submit Application