- BILT Inc. (Grapevine, TX)
- …audit-ready documentation, and support regular reporting on security metrics and vulnerability reports. This high-expertise role is ideal for an experienced ... accuracy and efficiency. . Support regular reporting on security metrics and vulnerability reports, providing clear insights to ensure transparency and compliance. .… more
- Lexitas Legal (Houston, TX)
- …PCI DSS, GDPR, etc.). + Support Security Operations Center functions, vulnerability management, and penetration testing. + Contribute to business continuity and ... onshore and offshore teams. + Expertise in network and application vulnerability management, penetration testing, firewalls, SIEM, IDPS, antivirus, and patch… more
- Anywhere Real Estate (Houston, TX)
- …Knowledge of Splunk and writing SPL. + Experience in Vulnerability Assessment, IDS/IPS configuration/monitoring, E-Mail security, Firewalls, TCP/IP packet analysis, ... Log analysis, understanding of IT standards, including but not limited to the OSI model, and the methods of exploiting those standards. + Knowledge of Information Security products and systems (Forensics toolkits, EDR, IDPS, HIPS, SIEM, etc.) + Extensive… more
- Fujifilm (Austin, TX)
- …anti-money laundering compliance risk analysis. Identify potential areas of compliance vulnerability and risk. Develop and implement action plans to mitigate ... potential risks. + Develop and manage compliance training on the Fujifilm Healthcare Code of Conduct, Interactions with Healthcare Professionals Policy, Anti-Kickback, False Claims Act, HIPAA, Anti-Corruption Policy and Antitrust Policy among others, to… more
- Google (Addison, TX)
- …of the following: threat modeling, incident/emergency response, OS hardening, vulnerability management, penetration testing, or cryptographic concepts. **About the ... job** A problem isn't truly solved until it's solved for all. That's why Googlers build products that help create opportunities for everyone, whether down the street or across the globe. As a Technical Program Manager at Google, you'll use your technical… more
- Fujifilm (Austin, TX)
- …+ Lead and coordinate First Of Kind deployments + Lead and coordinate Security/ Vulnerability Issues + Lead and Coordinate Subject Matter Expert (SME) Groups and ... Forums from various departments + Ability to take a lead role in large scale issue resolution + Participate in non-project related activities, such as presenting material at team meetings or working with cross-functional teams on internal projects + Mentor,… more
- RE Tech Advisors LLC (Dallas, TX)
- …building performance and/or emissions benchmarks. + Identification and evaluation of vulnerability and exposure to physical risk related to future climate scenarios; ... strategies to reduce Value at Risk. + Identify and recommend opportunities for process improvements in CRS service offerings and execute them as needed and assigned by CRS leadership. + Serve as supervisor to two or more direct reports, responsible for all… more
- SAIC (TX)
- …policies, procedures, standards, and guidelines. + Knowledgeable in Vulnerability Management. **Qualifications** **Required Qualifications:** + Bachelor's degree in ... Cybersecurity, Computer Science, Information Systems/Technology or engineering discipline preferred. + 10 years relevant experience required. + 8 years of relevant experience may be substituted for education. + Must be a US Citizen and have the ability to… more
- Robert Half Technology (Austin, TX)
- …enforce security best practices, including access controls, encryption, and vulnerability assessments + Collaborate with developers to design scalable, ... high-performance solutions that support stability and growth + Manage and optimize AWS cloud resources and services for cost efficiency and performance + Perform system backups, disaster recovery planning, and maintain data integrity and availability… more
- Robert Half Technology (Austin, TX)
- …practices into SDLC, CI/CD pipelines, and DevOps workflows + Integrate and manage vulnerability scanning tools (eg, Snyk for SAST, SCA, containers, IaC) + Build and ... secure deployment pipelines + Design and manage IAM solutions + Oversee runtime observability and security monitoring + Implement centralized logging, alerting, and incident investigation + Strengthen email security (SPF, DKIM, DMARC, anti-phishing) + Design… more