- Lincoln Financial (Sacramento, CA)
- …collects data and context necessary to initiate IR response. In addition, the analyst will be responsible for maintaining multiple security technologies for ... Years Information Security related experience, in areas such as: security operations, incident analysis, incident handling, and vulnerability management or… more
- The County of Los Angeles (Los Angeles, CA)
- …following solutions: secure access, email security , secure endpoint, network security , application security , or vulnerability management. *Experience at ... following solutions: secure access, email security , secure endpoint, network security , application security , or vulnerability management. *Experience at… more
- The County of Los Angeles (Los Angeles, CA)
- …play activities and interactions to address patients' concerns, stressors, and vulnerability potential related to illness, injury and health care. Provides a ... filing or email the required documents to the exam analyst at ###@dhs.lacounty.gov within seven (7) calendar days from...court order do not have to be disclosed. SOCIAL SECURITY NUMBER: Please include your Social Security … more
- ServiceNow, Inc. (Los Angeles, CA)
- …for creating innovative solutions leveraging ServiceNow Security Operations ( Security Incident Response, Threat Intelligence and Vulnerability Response). + ... Incident Response Center (CSIRC). + Strong understanding of Networking and Security technologies: SIEM, IDS /IPS, vulnerability management, end-point protection,… more
- Naval Facilities Engineering Command (Port Hueneme, CA)
- …activities to detect, deter, disrupt, and deny adversary activities. You will analyze security related events to provide a threat-based security assessment and ... sector. Specialized experience must demonstrate the following: 1) Performing network security monitoring, threat hunting, Security Operations Center (SOC)… more
- Ventura County (Ventura, CA)
- …management, business process improvement, applications support, voice/data infrastructure, data security , threat and vulnerability /risk management, and extended ... databases, including definition, organization, documentation, long term requirements planning, security and operational guidelines and performs related work as… more
- Pegasystems (Anaheim, CA)
- …the use of standards like OAuth2, SAML, and OIDC. + Working knowledge of Security Policies such as CSP, CSRF, and CORS + Solid understanding of Security ... and Certificate Management + Experience with OWASP Top 10 Vulnerabilities, analyzing vulnerability reports and solutions to mitigate (eg XSS, HTML Injection, etc.)… more