- GovCIO (San Antonio, TX)
- …with assessments and reports facilitating situational awareness and understanding of current cyber threats and adversaries. Develops cyber threat profiles based ... on geographic region, country, group, or individual actors. Produces cyber threat assessments based on entity threat analysis. May provide computer forensic and… more
- General Dynamics Information Technology (Fort Bliss, TX)
- …DCs, ACAS Security Centers, NMS, and other servers. + Work with the Security Manager and Operations Specialist to ensure all physical security measures ... are met. + Work with Information System Security Manager (ISSM) and Information System ...eight years of related experience with two years in cyber security . + Must have 5 years… more
- Bank of America (Addison, TX)
- …the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program ... security assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods...offered a role with Bank of America, your hiring manager will provide you with information on the in-office… more
- Bank of America (Addison, TX)
- …the Application Development Security Framework Program within Bank of America's Cyber Security Assurance Offensive Security group. The program ... ethical hacking assessments of the bank's technologies, applications, and cyber security controls while adapting testing methods...offered a role with Bank of America, your hiring manager will provide you with information on the in-office… more
- Toyota (Plano, TX)
- …global companies in the world. # Cyber **Who We're Looking For** Toyota's Cyber Security Risk Management Department is looking for a passionate and highly ... and enhance current risk management capabilities. Reporting to the Manager , the person in this role will support the...actions using Flow Designer or Integration Hub. + Implement Security Case Management, IOC correlation, and MITRE ATT&CK mapping.… more
- ForeScout Technologies, Inc. (TX)
- …Sales Texas Apply Who We Are We envision a world where every cyber asset is seen, secure, and compliant. Forescout Technologies, Inc., a global cybersecurity ... helps ensure the compliance of all managed and unmanaged cyber assets - IT, IoT, IoMT, and OT. For...voluntary life, accident and critical illness insurance, employee assistance program , maternity and parental bonding leave with supplemental pay… more
- Toyota (Plano, TX)
- …Generative AI development experience is a plus. + An advanced degree in Cyber Security Management or a related discipline. + Application development experience. ... address security gaps, and provide support for security remediation Reporting to the Senior Manager ,...Vehicle Purchase Discount + Toyota Team Member Lease Vehicle Program (if applicable) + Comprehensive health care and wellness… more
- DMS International (Lackland, TX)
- …the CE Manager + Maintain Cyberspace IT and Cybersecurity Workforce ( Cyber IT/CSWF) certification + in accordance with DoD Manual 8140.03 (Cyberspace Workforce ... a test configuration manner that does not alter the program code or compromise security safeguards, +...Telephones and telephone systems (TCO), Air Force ground radio program and Air Force Unit Communications Requirements Manager… more
- Amentum (Austin, TX)
- …not limited to Nuctech equipment. + Articulate detailed explanations of physical and cyber security vulnerabilities associated with continued use of security ... on strategy and implementation of all facets of this program , to include preventing untrusted security screening...Road Initiative (BRI) programs. + Experience as a supervisor, manager , or task force leader in a federal task… more
- Wabtec Corporation (Fort Worth, TX)
- …to know about you?** _You must have:_ + Bachelor's degree in Business, Technology, Cyber Security , Technology Risk Management or related field or strong hands-on ... Management** . This role reports to the ISA Sr Manager within EIS, and will be responsible for developing,...procedures for high-risk vulnerabilities + Ensure alignment of the program with overall security strategy and business… more