Featured Job
-
Job Removed or Not Found
Related Jobs
- CACI International, Inc. (Chantilly, VA)
- …*Perform additional technical analysis for ops support working with a dynamic and multi-discipline team to identify opportunities for new technical operations, inform
- Emerald Resource Group (Chicago, IL)
- …You must be a current US Citizen or Green Card Holder. Chief Information Security Officer (CISO) Overview A leading, fast-growing national healthcare provider is seeking
- Topsort (Somerville, MA)
- …Required- Alignment to our core values: Excellence, Participation, Integrity, and Collaboration Hungry, Humble, Smart Demonstrated business and technology acumen Strong
- Johns Hopkins University (Washington, DC)
- …Staff main public safety desks and actively monitor assigned cameras, reporting events outside of normal operation may be necessary. Actively greet and welcome visitors,
- Surefire Cyber (Elkridge, MD)
- …and welcome a further discussion. Interview Process Submit interest and application to on our website Preliminary phone interview with the the Talent & People Team
- Circadence Corporation (Boulder, CO)
- …Senior Product Manager - Project Ares Platform Location: Fully Remote Department: Engineering Reports to: Chief Technology Officer (CTO) Compensation: $120,000-$145,000,
- Chenega MIOS (Washington, DC)
- …Assist with developing and driving the global cybersecurity tactical operational initiatives by providing day-to-day management, oversight, and guidance to operations and
- Goldman Sachs, Inc. (Dallas, TX)
- …WHO WE ARE Led by the Chief Information Security Officer (CISO), Technology Risk secures Goldman Sachs against hackers and other cyber threats. We are responsible for
- American Express (New York, NY)
- …The Director, Business Disruption & Operational Resilience Risk Management is a new role focused on managing the risks associated with operational resilience
- Cymertek (Vienna, VA)
- …Design and implement cross-domain solutions Monitor and maintain secure data transfers Ensure compliance with security standards and protocols Conduct risk assessments on