- Charles Schwab (Southlake, TX)
- …such as Network Security, Cryptography, Identity and Access Management, Vulnerability Management, Logging and Monitoring, Cloud Platforms, and Application Security. ... + Familiar with one or more regulatory requirements and laws such as, but not limited to, PCI, Federal Financial Institutions Examinations Council, Sarbanes-Oxley Act, HIPAA, GDPR and GLBA. Additionally, experience in one or more: ISO 27001, ITIL and NIST.… more
- HP Inc. (Spring, TX)
- …(SDLC):** Knowledge of secure development practices, including secure coding, vulnerability testing, and release management. **Business Continuity Planning (BCP):** ... Understanding business continuity planning, disaster recovery strategies, and maintaining operational resilience. **Cybersecurity Awareness:** Understanding of cybersecurity principles, including threat detection, risk mitigation, and incident response.… more
- Caterpillar, Inc. (Irving, TX)
- …for production application services. Disaster recovery validation and troubleshooting. Vulnerability remediation. Provide status updates to the development leads and ... support managers across business areas. Provide technical guidance and support to team members. Apply modern principles, methodologies, and tools. Align IT control processes into day-to-day responsibilities to monitor and mitigate risk. Escalate appropriately.… more
- Citigroup (Irving, TX)
- …**Application Manager:** * Expertise in identifying and mitigating operational risks, Vulnerability issues, Compliance for a franchise critical application to make ... the app risk free. *Proven problem-solving skills in high-pressure environments. *Expertise in managing connectivity and file transformation or cards platform app management. **Technical Skills Requirements:** Apache Spark, Abinitio, Tibco BW, EMS, Java,… more
- JPMorgan Chase (Plano, TX)
- …risk management domains (such as access management, application security, vulnerability management, data protection, encryption, logging and monitoring, network ... security) with a primary focus of Identity and Access Management + Demonstrated ability to influence executive-level strategic decision-making and translating technology insights into business strategies for senior executives **Preferred qualifications,… more
- VetsEZ (TX)
- …VA/DoD Security Technical Implementation Guidelines (STIGs) for system hardening and vulnerability remediation. + Maintain and secure remote access tools including ... sFTP and RDP, ensuring compliance with encryption and access controls. + Configure and manage backup services using Commvault, including scheduling, validation, and restoration procedures. + Support the deployment of enterprise software tools including Visual… more
- CACI International (San Angelo, TX)
- …and implement the incident response plan. + Open trouble tickets when a vulnerability is discovered. + Review audit logs and communicate items of concern to ... the appropriate ISSM(s) weekly, and as directed by the ISSM. + Communicate security issues from the change management process to relevant personnel. + Identify security requirements specific to an information technology (IT) system in all phases of the system… more
- Lumen (Austin, TX)
- …identify and design solutions for issues involving: new features, interoperability, vulnerability , system limits and constraints facing the platforms and products. ... In addition, engineers are responsible to evaluate current capabilities and predict future needs, then work with internal stakeholders, vendors and peers to anticipate, define, and pursue these capabilities. A successful engineer is a strong communicator and… more
- Citigroup (Irving, TX)
- …knowledge of security hardening best practices (eg CIS benchmarks, vulnerability remediation, compliance enforcements) + Exposure to monitoring & observability ... in cloud compute solutions (CloudWatch, Prometheus) + Knowledge of security best practices, including IAM, encryption **Education:** + Bachelor's degree/University degree or equivalent experience **_Applicants must be authorized to work in the US (Citi will… more
- Koniag Government Services (San Antonio, TX)
- …security posture of DHA's systems, leading security hardening efforts, vulnerability assessments, and remediation activities. + Collaborates closely with ... cybersecurity teams to implement and maintain advanced security controls and monitoring solutions. + Provides strategic guidance on technology adoption, system architecture, and best practices. + Leads the evaluation and integration of new technologies to… more