- ISC2 (Austin, TX)
- …we do in support of our vision of a safe and secure cyber world. Our globally recognized, award-winning portfolio of certifications provide an independent and ... all career levels. Our charitable arm, the Center for Cyber Safety and Education, enables ISC2 and our members...You will hold ultimate responsibility for the Center's mission, strategy , operations, and impact, to lead the Center through… more
- Bank of America (Addison, TX)
- … strategy and roadmaps across Cloud and Container Security, Cyber Security Operational Controls, Security Functions and Capabilities outlining goals/outcomes, ... Cyber Security Cloud and Container Security Specialist Chicago,...solutions in alignment with the Bank's cloud and container strategy and in accordance with security best practices +… more
- Bank of America (Addison, TX)
- …develop and drive Cyber Security Critical Application Monitoring, CAM, tactics and strategy . To succeed in this role, you should be a proven content expert with ... Sr. Cyber Security Critical Application Monitoring (CAM) Analyst Chicago,...make an impact. Join us! This Cyber Security Senior Analyst role will… more
- Koniag Government Services (San Antonio, TX)
- **Koniag Data Solutions, LLC,** a Koniag Government Services company, is seeking a Cyber Governance, Risk and Compliance Subject Matter Expert II to support **KDS** ... to:** + Contributes to the development and implementation of cyber governance, risk management, and compliance strategies within the...in efforts to maintain compliance with DoD Zero Trust Strategy , DoD ICAM Strategy , DoD Digital Modernization… more
- Chevron Corporation (Houston, TX)
- …Chevron is accepting online applications for the position **Forensics Investigator, Cyber Intelligence Center** through **August 20, 2025** at **11:59 pm** (Central ... Time). Chevron's strategy is straight-forward: be a leader in efficient and...a great career with Chevron. Chevron's Information Risk Strategy & Management organization is seeking a self-directed professional… more
- Koniag Government Services (San Antonio, TX)
- …Services company, is seeking a Senior Configuration Change Management Services ( Cyber Network Security Engineer, Lead) to support KDS and our government customer ... and continuous improvement of DHA's configuration and change management strategy , ensuring alignment with DoD cybersecurity requirements, Risk Management Framework… more
- Bank of America (Addison, TX)
- Cyber Security Privileged Access Management (PAM) Analyst Charlotte, North Carolina;Washington, District of Columbia; Addison, Texas; Jacksonville, Florida; Denver, ... must be at least 18 years of age.** Acknowledge (https://ghr.wd1.myworkdayjobs.com/Lateral-US/job/Charlotte/ Cyber -Security-Privileged-Access-Management--PAM--Analyst\_25029922) **Job Description:** At Bank of America, we are… more
- WM (Austin, TX)
- …in an effort to align information technology solutions with Waste Management business strategy . **I. Job Summary** Directs the efforts of a team in the design, ... development, implementation, and support of various information technology/systems applications and/or projects. **II. Essential Duties and Responsibilities** To perform this job successfully, an individual must be able to perform the essential duties… more
- Sysco (Houston, TX)
- …architectures. + Partner with senior leadership to shape the long-term security strategy and roadmap aligned with business goals. + Conduct in-depth risk assessments ... and threat modeling to identify system vulnerabilities and recommend risk mitigation strategies. + Oversee the integration and optimization of security technologies including endpoint protection, SIEM, cloud security, identity management, and threat detection… more
- Public Consulting Group (Austin, TX)
- …program needs that enhance the lives of their user base. Services: + Strategy , Architecture, Planning, and Procurement + Business Enablement + Business Solutions + ... Project Assurance + Performs security assessments of information technology (IT) systems to verify they comply with applicable security standards. + Performs reviews and assessments of organizational security controls (policies, processes, configurations) to… more