- RTX Corporation (Tucson, AZ)
- …expertise to meet the needs of today's mission and stay ahead of tomorrow's threat . Our team solves tough, meaningful problems that create a safer, more secure ... to design near-field-to-far-field processing algorithms + Understanding of complex threat environments and battlefields + Experience designing datalink, flight… more
- Deloitte (Gilbert, AZ)
- …deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, ... risk appetite. It keeps the enterprise a step ahead of the evolving threat landscape and gives stakeholders confidence in the organization's cyber posture. Includes… more
- Deloitte (Gilbert, AZ)
- …deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, ... of Entra ID and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity, manage/migrate/deploy their LDAP… more
- CVS Health (Phoenix, AZ)
- …encryption, masking, and differential privacy techniques. + Conduct privacy threat modeling, data flow analysis, technical reviews and Privacy Impact ... tokenization, key management). + 3+ years of experience in performing privacy threat modeling, data flow mapping, and conducting DPIAs/PIAs. + 3+ years of… more
- Deloitte (Gilbert, AZ)
- …deliver powerful solutions to help our clients navigate the ever-changing threat landscape. Through powerful solutions and managed services that simplify complexity, ... of Entra ID and AD security and compliance reports and advanced threat protection capabilities such as Defender for Identity, manage/migrate/deploy their LDAP… more
- Coinbase (Phoenix, AZ)
- …you'll lead challenging investigations into illicit activity, proactively research threat actors, and develop scalable methods to detect suspicious patterns. ... potential mitigations and investigative best practices. * Monitor and research threat actors, their environments, and emerging blockchain trends to stay ahead… more
- Concentrix (Phoenix, AZ)
- …(PIM), and role-based access controls. + Integrate Defender for Cloud for threat protection and security posture management. + Ensure adherence to best practices ... for reliability, security, and cost optimization using the Well-Architected Framework (WAF). **Infrastructure-as-Code, Automation & DevOps** + Implement Infrastructure-as-Code using Bicep and Terraform. + Automate deployments and CI/CD pipelines with Azure… more
- Highmark Health (Phoenix, AZ)
- …of domains of security (eg zero trust, data protection, identity & access mgmt., threat mgmt., etc.) + 3 years of experience with data management, query processing, ... distributed processing, high availability, statistical and machine learning and operational excellence of production systems. **Preferred** + 3 years of experience in Mergers and Acquisitions (evaluation, integration, etc.) + 3 years of experience managing and… more
- Palo Alto Networks (Phoenix, AZ)
- …has brought technology to the market that is reshaping the cybersecurity threat and protection landscape. Our ability to protect digital transactions is limited ... only by our ability to establish relationships with our potential customers and help them understand how our products can protect their environments. This is where our sales teams come in. Our sales team members work together with large organizations to keep… more
- Wells Fargo (Chandler, AZ)
- …to remediate security vulnerabilities + Utilize Application Security tools for threat modeling, static/dynamic analysis, and software composition analysis + Identify ... and mitigate risks, including AI-specific threats such as prompt injection, model jailbreaks, and data manipulation + Design, code, test, debug, and document for projects and programs associated with technology domain, including upgrades and deployments +… more