- Northrop Grumman (San Antonio, TX)
- …Huntsville, AL, San Diego, CA, and Colorado Springs, CO. A Cybersecurity Systems Engineer (CSSE) ensures cyber survivability attributes are implemented in system ... A CSSE supports the definition of security governance, and risk management. As a Cyber Systems Engineer on this team, you will have the following… more
- Northrop Grumman (San Antonio, TX)
- …Huntsville, AL, San Diego, CA, and Colorado Springs, CO. A Cybersecurity Systems Engineer (CSSE) ensures cyber survivability attributes are implemented in system ... A CSSE supports the definition of security governance, and risk management. As a Cyber Systems Engineer on this team, you will have the following… more
- Capgemini (Irving, TX)
- …Intelligence Analyst. The DECODE team stands at the forefront of defending client cyber operations , combining the expertise of CTI Analysts and Detection ... defensive countermeasures. + Conduct regular briefings to convey cyber threat intelligence to both technical and non-technical audiences, supporting Computer… more
- Chevron Corporation (Houston, TX)
- …implementation, execution and validation of security program, strategy, and operations . * Protects information and information systems from unauthorized access ... assurance and mitigation actions from security threats. * Establishes and leverages defensive measures and information collected from a variety of sources to… more
- Chevron Corporation (Houston, TX)
- …implementation, execution and validation of security program, strategy, and operations . * Protects information and information systems from unauthorized access ... assurance and mitigation actions from security threats. * Establishes and leverages defensive measures and information collected from a variety of sources to… more
- Optiv (Dallas, TX)
- …specialist and experts, the Sr. DSA will drive thought leadership and inspired cyber security solutions powered by our ecosystem of people, products, and partners. ... success. + Maintain knowledge of the client's security environment, business operations , security needs, and risk appetite. Identify their security concerns and… more