- Fujitsu (Richardson, TX)
- …. Req ID:16397 Position Description 1Finity is seeking a Solution Architect III to be responsible for the deployment, implementation ... in the telecom, public and private sector. Our Solution Architect III will be considered a subject...to various teams and customers to integrate with other network applications and systems . + Collaborate with… more
- SCI Shared Resources, LLC (Houston, TX)
- …joining a Great Place to Work! Assesses, evaluates, designs, and builds systems ensuring security requirements protect and secure the organization's data and ... including reference models, segment and solution architectures, and the resulting systems supporting those missions and business processes; provides guidance to… more
- Texas A&M University System (Bryan, TX)
- …Title Data Architect Agency Texas A&M Transportation Institute Department Tti Network & Information Systems Proposed Minimum Salary Commensurate Job Location ... Systems Engineer II will serve as TTI's data architect and is responsible for the management of TTI's...project management standards Other Duties (5%) Serves as Tier II/ III contact for agency communication and collaboration systems… more
- Akumin (Waco, TX)
- …and configuration management tools. + **Design and Implementation of Security Systems :** Architect and implement security controls, including firewalls, ... The **Security Engineer III ** plays a vital role in securing Akumin's...vital role in securing Akumin's IT infrastructure, networks, and systems . This role focuses on designing, implementing, and managing… more
- RTX Corporation (Richardson, TX)
- …DISA STIG/SRG hardening across Linux and Windows. + Background in network / systems security (architecture, topology, protocols, components, principles). + ... **Security Clearance:** DoD Clearance: Secret Collins Aerospace is seeking an Information Systems Security Manager (ISSM) who strives for excellence and has a… more
- ASM Research, An Accenture Federal Services Company (Austin, TX)
- …and stays abreast of tools, techniques, countermeasures, and trends in computer network vulnerabilities. + Configures and validates secure systems , tests ... extent of compromise to national security information and automated information systems . + Defines security objectives and system-level performance requirements. +… more