📞 Contact
Location: Jacksonville, Florida
🎯 Cyber Initiatives
Identity Access Management - Regulatory Drivers: SOX ITGCs (user access, provisioning, deprovisioning), SEC cybersecurity disclosure expectations, GxP-adjacent systems (even if IAM itself is not Gxp) - Risk objectives: Reduce unauthorized access, Improve access governance defensibility, Support audit-ready evidence and reporting - IGA: Joiner/Mover/Leaver automation, Role-based or attribute-based access control (RBAC/ABAC), Access request & approval workflows, Periodic access certifications (manager, app owner), SoD policy definition and violation detection, Audit-ready access reports - AM: SSO (SAML, OIDC, OAuth), MFA Integration (Microsoft, Duo, etc.), Conditional access support, Workforce vs. partner vs. contractor accessThird-Party Risk Management - Regulatory & Disclosure Drivers: SOX (ITGC dependency on third parties), SEC cybersecurity risk oversight & disclosure, Customer contractual security obligations - Risk objectives: Prevent third-party cyber incidents from becoming material events, Demonstrate defensible, repeatable third-party risk decisions, Reduce questionnaire fatigue while maintaining rigorAI Risk Management Framework - Risk taxonomy support: Bias & fairness, Privacy & data protection, Security & misuse, Explainability & transparency, Model reliability & performance drift, Regulatory/legal exposure - Risk Assessment Capability: Configurable likelihood x impact scoring, Support for qualitative and quantitative models, Ability to align scoring criteria to ERM thresholds and materiality definitions - Evidence-based Assessments: Attach documentation, testing results, vendor attestations, maintain point-in-time snapshots for audit defensibility
🚫 Not Interested In
MSSP ServicesSIEMEDR/MDR | Vulnerability Management | PAM | DLP | Asset/Patch Management | Incident Response | SSO/MFA