- Google (New York, NY)
- …experience. + 10 years of experience developing technical strategy and managing security in areas including Physical Access Control, Intrusion Detection, Video ... + Experience in technology delivery, design and execution within Physical/Cyber Security industries with PSP, CPP, CompTIA Security +, CompTIA Network+… more
- Rochester Institute of Technology (Rochester, NY)
- …as well as compliance with Institute, federal, and state regulations. Serves as security administrator for all software and systems access for admissions and ... access levels. Manages and audits SIS student records security roles and consults with admissions and financial aid...like Slate, ProSAM, PeopleSoft SIS, programming and data structure, information technology security . + Ability to track… more
- City of New York (New York, NY)
- …twenty-four (24) semester credits in cyber security , network security , computer science, computer programming, computer engineering, information technology, ... college or graduate school in cyber security , network security , computer science, computer programming, computer engineering, information technology,… more
- City of New York (New York, NY)
- …twenty-four (24) semester credits in cyber security , network security , computer science, computer programming, computer engineering, information technology, ... college or graduate school in cyber security , network security , computer science, computer programming, computer engineering, information technology,… more
- Mastercard (New York, NY)
- …to your email promptly. **Corporate Security Responsibility** All activities involving access to Mastercard assets, information , and networks comes with an ... employer that considers applicants without regard to gender, gender identity , sexual orientation, race, ethnicity, disabled or veteran status,...for, or on behalf of, Mastercard is responsible for information security and must: + Abide by… more
- GE Aerospace (Niskayuna, NY)
- …create a contract of employment with any individual. \#LI-MV1 _This role requires access to US export-controlled information . Therefore, for applicants who are ... requires the individual to obtain and maintain US Government Security Clearance; **prerequisite for a security clearance...be contingent on the ability to obtain authorization for access to US export-controlled information from the… more
- Jensen Hughes Inc. (New York, NY)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- Jensen Hughes Inc. (New York, NY)
- …regard to race, color, religion, sex, national origin, sexual orientation, gender identity , disability or protected veteran status._** The security of your ... or destruction. We protect your personal data against unauthorized access , use, or disclosure, using security technologies...confidentiality of personal data and may not use the information for any unauthorized purpose. *Policy on use of… more
- GE Aerospace (Niskayuna, NY)
- …not create a contract of employment with any individual. _This role requires access to US export-controlled information . Therefore, for applicants who are not ... requires the individual to obtain and maintain US Government Security Clearance; prerequisite for a security clearance...be contingent on the ability to obtain authorization for access to US export-controlled information from the… more
- Mastercard (New York, NY)
- …to your email promptly. **Corporate Security Responsibility** All activities involving access to Mastercard assets, information , and networks comes with an ... employer that considers applicants without regard to gender, gender identity , sexual orientation, race, ethnicity, disabled or veteran status,...for, or on behalf of, Mastercard is responsible for information security and must: + Abide by… more