- UKG (Ultimate Kronos Group) (San Francisco, CA)
- …protocols, including TCP/IP, DNS, DHCP, and routing protocols * Define and review security policies to control access to systems * Experience with firewall ... access to resources * Recommend, create, and maintain security configuration baselines to harden systems * Ensure all...already hold the #1 market share position for workforce management and the #2 position for human capital … more
- Robert Half Technology (El Monte, CA)
- …and alerts to identify and respond to potential threats. * Implement and manage identity and access management systems, ensuring secure user provisioning and ... addressing incidents effectively. Responsibilities: * Oversee the administration and management of security tools, including firewalls, intrusion… more
- Live Nation (Beverly Hills, CA)
- …if this sounds like you then please read on! THE ROLE The Principal Data Security Architect / Governance will be a pivotal leader in establishing and maturing Live ... Nation Entertainment's data security program. This role is responsible for defining the...data ecosystem, analyzing what data exists where, its ownership, access patterns, encryption states, and retention lifecycle. This is… more
- Umbra Lab (Goleta, CA)
- …GCP). + Experience with security infrastructure tools such as IAM & access control, encryption & key management , vulnerability management and threat ... is changing, where, and how fast. Umbra provides easy access to the highest quality commercial satellite data available,...modeling, and compliance frameworks, and make informed decisions about security trade-offs and risk management . + Work… more
- FocusKPI Inc. (Mountain View, CA)
- …gateways, AWS transit), enforcing traffic‑control policies. + Implement and manage OCI Identity and Access Management (IAM) policies, compartments, dynamic ... or other configuration management tooling. + Solid understanding of security best practices, including least privilege access , encryption, system hardening,… more
- Deloitte (San Francisco, CA)
- …Copilot and GitHub Copilot usage, encompassing data governance, content filtering, access management , code scanning, vulnerability detection, and intellectual ... security playbooks for AI models, focusing on encryption, access control, data integrity, model scanning, and overall AI...threat detection and response + Deploying and managing AI Security Posture Management (AI-SPM), Cloud Security… more
- Allied Universal (San Jose, CA)
- …all visitors and staff. You will be expected to respond promptly to any security -related concerns, assist with access control, and communicate clearly with both ... clearly and professionally with clients, visitors, and Allied Universal management regarding security -related matters. + Follow all...location, adapting to changes as needed. + Assist with access control and visitor management as required… more
- ManTech (Los Angeles, CA)
- **Personnel Security Specialist II** ManTech seeks a motivated, career and customer-oriented **Personnel Security Specialist II** to join our team in **El ... Segundo, CA** . The Personnel Security Specialist's primary function is to handle personnel ...services for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities. **Responsibilities include but are not… more
- Deloitte (Los Angeles, CA)
- …Sentinel with KQL). + Secure training environments (Azure ML, HSMs). + Data access controls (Azure Policy, Purview). + Security assessment tools (SAST, DAST) ... value. Work you'll do As a Deloitte Manager, AI Security Engineer, you will be crucial in safeguarding our...Index) + Implement secure training environments and fine-grained data access controls + Contribute to AI-generated fraud detection in… more
- Applied Materials (Santa Clara, CA)
- …security infrastructure. **Principal Responsibilities** + Design and deploy physical security systems including CCTV, access control, intrusion detection, and ... ) and external vendors or contractors. + Oversee the deployment of physical security technologies (eg, CCTV, biometric access , intrusion detection). + Evaluate… more