Featured Job
-
Job Removed or Not Found
Related Jobs
- Diverse Lynx (Chicago, IL)
- …: Endpoint Management and Security solutions. Vulnerability remediation architecture. Proficiency and good working experience in Microsoft Intune Good to have JAMF,
- Kandji (Miami, FL)
- …3+ years of experience in cybersecurity, specifically focused behavioral detections. Proven expertise in developing file-based and behavioral detections (YARA, Sigma).
- Insight Global (Richmond, VA)
- …including threat intelligence, vulnerability management, incident response, and the design, implementation, and tuning of defensive security controls. In this role, you
- Cantalician Center for Learning (Buffalo, NY)
- …Supervise, mentor, and develop IT Specialist I and II, fostering a collaborative and high-performing team culture. Recruit, hire, and oversee staff in key leadership and
- Chick-fil-A, Inc. (Atlanta, GA)
- …Configure, maintain, and improve mobile device management (MDM) platforms ensuring mobile devices at Chick-fil-A restaurants receive appropriate applications, resources,
- Obsidian Security (Palo Alto, CA)
- …Own product strategy and roadmap for AI-based cybersecurity products (eg, threat detection, behavior analytics, anomaly detection, threat intelligence, etc.). Partner
- Obsidian Security (Boston, MA)
- …Backed by top investors including Greylock, Norwest Venture Partners, and IVP, we've built a complete SaaS security platform to reduce risk, detect and respond to
- Schneider Electric (Boston, MA)
- …Monitor and Analyze Security Telemetry Continuously monitor telemetry from OT-specific sensors, IT-Specific Sensors, SIEM platform, and Network Security tools to detect
- Headquarters, NASA (Washington, DC)
- …include establishing strategy, policies, programs, and frameworks for the security of classified and unclassified information and information systems at NASA. Also,
- Otsuka Pharmaceutical Co., Ltd. (Princeton, NJ)
- …The Director, Information Security Architect is responsible for providing leadership through definition and communication of security control requirements for OAPI/OPDC