- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Celestica (Richardson, TX)
- …for verification of trusted software like secure boot + Stay up-to-date on security best practices and vulnerability remediation **Collaboration** : + Work ... may require extended periods of sitting and sustained visual concentration on a computer monitor or on numbers and other detailed data. + Repetitive manual movements… more
- Robert Half (Houston, TX)
- … Computer Science, Data Science, Decision Science, Engineering, Information Systems , Information Technology, Internet of Things, Applied Math, Machine Learning, ... client needs and tailoring appropriate solutions using Microsoft technologies. + Security and Privacy: Strengthens cyber resilience and data protection via risk… more
- Aramco Services Company (Houston, TX)
- …of risk-based controls across functional IT areas including networks, firewalls, vulnerability management, systems development, information security , ... contract compliance, reviews of selected internal controls, reviews of IT systems , and audits of organizations. Audits may be organizational, functional, financial… more
- Nightwing (San Antonio, TX)
- …Familiar with RTOS's Responsibilities + Support the architecture and design of FPGA-based security modules for computing systems + Digital design (VHDL) for ... Nightwing provides technically advanced full-spectrum cyber, data operations, systems integration and intelligence mission support services to meet our customers'… more
- Aramco Services Company (Houston, TX)
- …of risk-based controls across functional IT areas including networks, firewalls, vulnerability management, systems development, information security , ... contract compliance, reviews of selected internal controls, reviews of IT systems , and audits of organizations. Audits may be organizational, functional, financial,… more
- General Motors (Austin, TX)
- …Infrastructure team to ensure the platform is complaint with all corporate cyber- security , vulnerability , and infrastructure requirements. + Partner with and ... today's impossible into tomorrow's standard -from breakthrough hardware and battery systems to intuitive design, intelligent software, and next-generation safety and… more
- Fujifilm (Austin, TX)
- …+ Lead and coordinate First Of Kind deployments + Lead and coordinate Security / Vulnerability Issues + Lead and Coordinate Subject Matter Expert (SME) Groups ... and thorough with a strong sense of urgency **Qualifications:** + Bachelor's degree in computer science or related field or equivalent work experience + 15+ years of… more
- Robert Half Technology (Austin, TX)
- … security best practices, including access controls, encryption, and vulnerability assessments + Collaborate with developers to design scalable, high-performance ... and maintain data integrity and availability Requirements Qualifications: + Bachelor's degree in Computer Science, IT, or related field + 5+ years in a DevOps role,… more