- Rubrik (Austin, TX)
- …management . + Experience with modern data protection, cloud-native infrastructure, security, identity , or cyber recovery solutions. + Familiarity with hybrid ... enabling organizations to safeguard their most critical assets from cyber threats, operational disruptions, and data loss. As the...loss. As the leader in data security and cloud management , Rubrik empowers enterprises to simplify and secure their… more
- CGI Technologies and Solutions, Inc. (San Antonio, TX)
- …Database Activity Monitoring (DAM), Public Key Infrastructure (PKI), Data Loss Prevention (DLP), Identity and Access Management (IAM) solutions CGI is ... **SOC Analyst** **Category:** Cyber Security **Main location:** United States, Alabama, Huntsville...Services based out of Huntsville, AL. We provide Incident Management and Intrusion Detection services, along with Threat Hunting… more
- ISC2 (Austin, TX)
- …enables ISC2 and our members to serve the public by educating the most vulnerable about cyber risks and empowering access to enter and thrive in the cyber ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- ISC2 (Austin, TX)
- …enables ISC2 and our members to serve the public by educating the most vulnerable about cyber risks and empowering access to enter and thrive in the cyber ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- ISC2 (Austin, TX)
- …enables ISC2 and our members to serve the public by educating the most vulnerable about cyber risks and empowering access to enter and thrive in the cyber ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- ISC2 (Austin, TX)
- …enables ISC2 and our members to serve the public by educating the most vulnerable about cyber risks and empowering access to enter and thrive in the cyber ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- TXNM Energy (Alvin, TX)
- … identity verification and a criminal background check. Prior to being granted unescorted access to cyber secure areas, the candidate must attend cyber ... + Experience coding database descriptions and specifies identifiers of database-to-database management system + Ability to synthesize complex or diverse information,… more
- MartinFederal Consulting, LLC (Houston, TX)
- …for all SOC service requests in accordance with SLAs and OLAs + Escalate cyber incidents that require further in-depth analysis to SOC Incident Analysis + Categorize ... and prioritize cyber events and other SOC service requests + Document...+ Document and track incidents (via NASA's authoritative incident management system) in accordance with the reporting procedure and… more
- ISC2 (Austin, TX)
- …enables ISC2 and our members to serve the public by educating the most vulnerable about cyber risks and empowering access to enter and thrive in the cyber ... we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and… more
- TXNM Energy (Texas City, TX)
- … identity verification and a criminal background check. Prior to being granted unescorted access to cyber secure areas, the candidate must attend cyber ... this job title may be covered by NERC CIP cyber security standards. If the position is covered, prior...+ Provides the diverse and advanced engineering and project management expertise associated with large and high-profile projects and/or… more