- GovCIO (Austin, TX)
- …the DISA ACAS Best Practices Guide. The administrator will also manage Army Endpoint Security Solution (AESS) Site Reviewer activities, DISA Whitelist, and PKI ... scanning, reporting, and analysis. + Proficiency in managing Army Endpoint Security Solution (AESS) Site Reviewer activities....employees enjoy working here. In addition, our employees have access to a range of perks and benefits to… more
- Robert Half Technology (San Antonio, TX)
- …management of hardware/software assets. * Enforce IT policies related to data security , access control, and compliance standards. Infrastructure & Network ... Mac, and Linux systems, both in-person and remotely. * Manage endpoint protection, patching, software deployment, and asset lifecycle across the organization.… more
- Ryder System (Austin, TX)
- …**Will have to work night shifts and weekends. - REMOTE** **Summary** The identity and access management (IAM) engineer position is a practitioner role ... and manage identities across the organization. The engineer manages and maintains access to systems and applications following rigorous security , engineering,… more
- Talen Energy (Houston, TX)
- …software, including firewalls, intrusion detection systems, cryptography systems, and anti-virus/ endpoint security software. + Participate in penetration testing ... be considered as substitution for experience. + Advanced understanding of security control environment ( access control, logging, authentication, encryption,… more
- Cayuse Holdings (Austin, TX)
- …solutions. The ideal candidate will possess in-depth expertise in BeyondTrust's privileged access management (PAM) and endpoint security products and ... expert (SME)** for the design, implementation, and management of BeyondTrust's **Privileged Access Management (PAM)** and related security tools. + Lead the… more
- BEAT LLC (San Antonio, TX)
- …with IA, endpoint , and enterprise management teams to integrate identity solutions with security monitoring, automation, and risk assessment frameworks. ... Identity Engineer provides technical expertise to design, implement, and sustain enterprise identity and access management (IdAM) solutions in support of the… more
- BEAT LLC (San Antonio, TX)
- …with IA, endpoint , and enterprise management teams to integrate identity solutions with security monitoring, automation, and risk assessment frameworks. ... Identity Engineer provides technical expertise to design, implement, and sustain enterprise identity and access management (IdAM) solutions in support of the… more
- Sedgwick (Fort Worth, TX)
- …Analyst **PRIMARY PURPOSE OF THE ROLE:** To manage the implementation of security measures to protect company data, networks, and computer systems. To focus ... on executing security fundamentals for threat detection, investigation, and response efforts....responsibilities include software setup and customization, user enrollment and access management, and seamless integration with enterprise systems such… more
- NTT DATA North America (Austin, TX)
- …resource utilization. Security & Compliance + Enforce Linux system security best practices, including access control, encryption, and secure configurations. ... cloud instances across AWS, Azure, GCP, and OCI with security guardrail and backend deployment. + Implement and maintain...+ Manage user access , sudo privileges, and SSH key policies in line… more
- NTT America, Inc. (Plano, TX)
- …and resource utilization. ** Security & Compliance** Enforce Linux system security best practices, including access control, encryption, and secure ... Self-Provision cloud instances across AWS, Azure, GCP, and OCI with security guardrail and backend deployment. Implement and maintain system monitoring, alerting,… more
Recent Jobs
-
Director - Regulatory & Supervisory Management, E-Trading Supervision, TD Securities
- TD Bank (New York, NY)
-
Property Management Analyst
- AECOM (Sacramento, CA)
-
Senior Principal Analog Design Engineer
- Northrop Grumman (Los Angeles, CA)
-
CAD Specialist
- Canon USA & Affiliates (Cleveland, OH)