- Trellix (Tallahassee, FL)
- …to develop expertise with Trellix products. + You have familiarity with cyber threat identification, management, mitigation, and response strategies. + You ... security systems comprised of Trellix and third-party technologies. The Endpoint Security Engineer (ESE) will report to the Senior Manager of the Professional… more
- Oracle (Tallahassee, FL)
- …a bonus. + Exposure to emerging WIDS capabilities, radio frequency analytics, cyber -physical threat detection, and advanced data retention strategies. + ... the central point for WIDS product feedback, performance metrics, evolving threat landscapes, and continual improvement. _Stakeholder Training & Enablement_ + Design… more
- Oracle (Tallahassee, FL)
- …dashboards, and analytic tools to monitor detection program effectiveness and threat trends over time. + Provides mentorship, technical guidance, and professional ... physical security detection programs, seeking innovative approaches to meet evolving threat landscapes. + Travels globally as required to oversee program rollout,… more
- ASM Research, An Accenture Federal Services Company (Tallahassee, FL)
- …weaknesses. + Maintains the computer and information security incident, damage and threat assessment programs. + Responsible for the formal Security Test and ... processes and security protocols and makes recommendations for increased cyber security protection. **Minimum Qualifications** + Bachelor's Degree in Computer… more
- Proofpoint (Orlando, FL)
- …problem-solving, Exceptional in execution and impact. **Corporate Overview** In today's cyber threat landscape, protection starts with people. At Proofpoint, ... team** + 4+ years of industry experience in a client/professional service, sales engineer , senior support engineer , IT operations management, or senior … more
- Oracle (Tallahassee, FL)
- …Algorithms, Symmetric/Asymmetric keys, Hashing , Signing, Encryption/Decryption , Cyber Security, Cryptography **Preferred Qualifications** + Hands-on experience ... translating requests into prioritized work or features + Expertise in applying threat modeling or other risk identification techniques to develop security solutions… more