Featured Job
-
Job Removed or Not Found
Related Jobs
- Midway Products Group (Monroe, MI)
- …The OT Cyber Security Engineer will be responsible for ensuring the security and reliability of the organization's Operational Technology (OT) environment. This will
- FirstEnergy Corp (Wadsworth, OH)
- …Include: - Respond to cyber-related and cyber-adjacent security issues in a dynamic, 24/7 environment with a rotating on-call component - Execute incident response plans
- Bering Straits Native Corporation (Washington, DC)
- …ESSENTIAL DUTIES & RESPONSIBILITIESThe Essential Duties and Responsibilities are intended to present a descriptive list of the range of duties performed for this
- Abbtech Professional Resources (Wheaton-Glenmont, MD)
- …and Duties: Develop, implement, and monitor a strategic, comprehensive enterprise information security and IT risk management program. Lead the enterprise's information
- Oglethorpe Power (Tucker, GA)
- …Bachelor's Degree in Engineering, Information Technology, Business Administration, or related field.Experience:Analyst II: 5 years of ITIL process and ITSM experience
- Fidelity TalentSource LLC (Merrimack, NH)
- …RoleThe External Audit Center of Excellence within Fidelity s Enterprise Technology Risk and Analytics (ETRA) group is seeking a passionate, driven, and experienced
- Metasys Technologies, Inc. (Dallas, TX)
- …Ideation, testing, proof of concept, and support for various cybersecurity related projects. Analysis of complex security issues, and development and engineering
- Fidelity TalentSource LLC (Westlake, TX)
- …Director, Edge Security Ops The Purpose of This RoleThe qualified candidate must be adaptable and able to work in a fast-paced environment where learning new skills and
- Dexian - DISYS (Oak Grove, NC)
- …Position Requirements:Experience executing security incident handling processes and procedures.Working knowledge of Networking fundamentals including but not limited to;
- Venteon (Maumee, OH)
- …This will involve identifying and mitigation cyber threats, monitoring systems for vulnerability, and developing and implementing cyber defense