- Cengage Group (Jacksonville, FL)
- …protection, and encryption protocols. + Lead security operations center (SOC), threat hunting capabilities, and vulnerability management programs that ... reporting to the CIO, this role serves as the primary authority on cybersecurity matters and partners closely with business leaders, legal, compliance, and the board… more
- TECO Energy (Ybor City, FL)
- …and technologies. + A solid understanding of fundamental principles of cybersecurity , including threat landscape, vulnerabilities, and risk management. + ... position requires 4 days per week in office / 1 remote Hiring Manager : **Luis Valdes** Recruiter: **Mark E Koener** **TITLE: Enterprise Cyber Security Solution… more
- MUFG (Tampa, FL)
- …including Security Governance and Oversight, Security Risk Management, Network Security, Threat and Vulnerability Management, or Incident Response and Forensics ... team will provide more details. **Job Summary ** This Manager leads a frontline team responsible for incident routing,...+ 7 + years of experience working in the Cybersecurity Operations or Information Security + Relevant technical and… more
- MUFG (Tampa, FL)
- …to understand application architectures and identify potential security risks + Create threat models for applications, review output from DAST and SAST reviews, ... to identify and mitigate threats effectively. + Crosstrain other teams on threat modeling techniques and best practices. + Architectural Review & Risk Challenge… more
- MUFG (Tampa, FL)
- …CS), and Azure Active Directory (Azure AD). + 5 years' experience in cybersecurity assessment activities or IT audit, penetration testing, and/or vulnerability ... one or more of the following control areas: + Active Directory + Vulnerability Management + Configuration Management + Cloud services + Experience in performing… more
- MUFG (Tampa, FL)
- …+ Master's Degree (preferred) + 5-7+ years of technical experience in cybersecurity , insider threat , incident response, security operations, or related ... cybersecurity tools and methods + Database Firewall, Data Classification + Vulnerability detection and mitigation + Cybersecurity experience in regulated… more