- SOS International LLC (Miami, FL)
- …Job Duties Utilize HBSS to perform network scans and determine areas of vulnerability . Recommend solutions and areas of improvement for the cyber hardening of the ... network Establish IT requirements in the development of enterprise-wide/ large-scale Client/Server infrastructures (CAN, MAN, WAN). Design architectures to include operating systems, applications, and hardware to support total customer requirements as well as… more
- GovCIO (Tampa, FL)
- …Web security, Endpoint security management, Data Loss Prevention (DLP), and Vulnerability Management. + Assist the government/host nation customer with identifying ... any derived design objectives, technical specifications, performance requirements, and interoperability specifications to ensure the system design will meet stakeholder end-to-end requirements. + Be a proven leader with the capability to confidently brief… more
- MUFG (Tampa, FL)
- …and Oversight, Security Risk Management, Network Security, or Threat and Vulnerability Management. + Knowledge of cloud security, AI security, networks, databases, ... and applications + Knowledge of the various types of cyber-attacks and their implementations + Experience in operational processes such as security monitoring, data correlation, troubleshooting, security operations, etc. The typical base pay range for this… more
- American Express (Sunrise, FL)
- …disaster recovery, dependency risk management, resiliency monitoring, operational vulnerability management and resiliency compliance management. + Support compliance ... with Resilience-related regulations and standards (eg, OCC Bulletin 2020-94, FFIEC Handbooks, DORA, GLBA, etc.) to meet legal and regulatory obligations. + Influence and help embed a strong risk-aware culture, encouraging proactive risk management behaviors at… more
- Rubrik (Tallahassee, FL)
- …and aid investigation when needed; + Support controlled changes and vulnerability remediation activities; and + Work collaboratively with Information Security in ... designing, implementing, assessing or enhancing system-specific security and privacy controls. **Position Risk Designation** **:** This position carries duties and responsibilities involving the US Federal Government's interests. The selected incumbent may be… more
- MyFlorida (Tallahassee, FL)
- …of heath care coding conventions, fraud schemes, general areas of vulnerability , reimbursement methodologies and relevant laws. * Provides investigative support to ... the Program Integrity Unit. * In collaboration with the team and the Program Integrity Unit Manager, draft investigative work plans and develop case strategies based upon analysis. * Organize data and prepare a written summary of investigative steps,… more
- ServiceNow, Inc. (Orlando, FL)
- …System Administrator + ServiceNow Certified Developer + ServiceNow Vulnerability Response Implementations Certification + ServiceNow Security Incident Response ... Certification **Work Personas** We approach our distributed world of work with flexibility and trust. Work personas (flexible, remote, or required in office) are categories that are assigned to ServiceNow employees depending on the nature of their work and… more
- UKG (Ultimate Kronos Group) (Weston, FL)
- …and disaster recovery strategies. + Participate in security audits and vulnerability assessments. **Documentation & Support:** + Create and maintain comprehensive ... technical documentation for systems, configurations, and procedures. + Provide support and troubleshoot issues, responding to incidents and resolving problems efficiently. + Participate in an on-call rotation as required. **Basic Qualifications:** + 5+ years… more
- Chewy (Plantation, FL)
- …on our public clouds. + Collaborate with Site Reliability Engineering, Vulnerability Management, and Security Operations teams to achieve shared security goals. ... + Ensure applications and infrastructure deployed to public clouds meet performance, privacy, and security requirements. **What You'll Need:** + Bachelor's degree or higher in Computer Science, Computer Information Systems, or similar; or equivalent… more
- MUFG (Tampa, FL)
- …API's, microservices, containers and cloud-native apps . Ability to interpret vulnerability scans, penetration test results, SAST and DAST reports and translate ... findings into risks the business understands . Understanding of the regulatory environment and regulations related to technology risk, and Office of the Comptroller of the Currency (OCC) and Federal Reserve Board (FRB) expectations. . Professional… more