- Applied Research Solutions (San Antonio, TX)
- …Risk Management Framework Implementation Plan, Security Concepts of Operations Security Risk Analyses, Security Vulnerability and Countermeasure ... Acquisition Report (SAR), Statement of Work (SOW), Statement of Objectives (SOO), Systems Metric and Reporting System (SMART), System Security Management Plan,… more
- Robert Half Technology (Mcallen, TX)
- …regulations and banking security standards. Qualifications: . Bachelor's degree in Computer Science, Information Systems , or a related field (or equivalent ... user readiness, and policy compliance. . Develop, test, and deploy security policies, compliance configurations, and applications using Intune and related tools.… more
- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- GovCIO (Austin, TX)
- …protocols to safeguard systems and sensitive data. + Perform routine security audits and vulnerability assessments to proactively mitigate risks. + Ensure ... cloud environmentsforthe Department of Veterans Affairs.The candidatewillmaintaintheinfrastructure,ensureoptimalsystem performance, andupholdstringent security measures.This position is fully remote within the United… more
- CACI International (Austin, TX)
- …of networked sensors, assets, and platforms for a variety of critical national security driven missions. We are looking for a talent Senior Technical ELINT Analyst ... on new radar technologies, EA signals, P-Cubed analysis, and system vulnerability assessments based on sound engineering judgment and advanced analytical techniques.… more
- US Army Intelligence and Security Command (San Antonio, TX)
- …work in this job. Specialized experience is defined as: Conducting offensive Computer Network Operations (CNO), network reconnaissance and vulnerability analyses ... library holdings, photographs, statistics, graphics and maps; Knowledge of the systems , procedures and methods of analyzing, compiling, reporting and disseminating… more