- Excellus BlueCross BlueShield (Latham, NY)
- …(eg, Palo Alto Networks, Imperva). + Experience and knowledge of identity and access management systems, including Active Directory, Entra ID, LDAP, and various ... and presents recommendations to the security manager and various levels of management regarding protection of computing resources and information assets. + Builds &… more
- ADP (Roseland, NJ)
- …configuration, threat protection, network security, data protection and Identity and Access Management . + Document security standards, requirements, and best ... best practices. + Experience with compliance technologies and reporting (vulnerability management , server hardening, configuration management , etc.). + Strong… more
- The MITRE Corporation (Bedford, MA)
- …with particular emphasis in Cryptography, Software Assurance (SWA), Identity, Credential and Access Management (ICAM) and Trustworthy AI. L527 develops and ... collaboration, understanding, and alignment. + Ensure that performance and compensation management processes are fair and transparent. + Maintain a welcoming and… more
- FGS, LLC (MD)
- …enforce cloud security architecture for hybrid environments. + Implement identity and access management (IAM), encryption, and zero-trust principles. + Apply ... Azure security services (KMS, IAM, Security Center). + Proficiency in vulnerability management and SIEM integration. + Ability to design and validate security… more
- Republic Services (Phoenix, AZ)
- …Platforms. + Working knowledge of cloud security configurations and controls, identity, and access management (IAM), cryptography / key Management , and ... differ in each market we serve. By combining local operational management with standardized business practices, we drive greater operating efficiencies across… more
- Celestica (Richardson, TX)
- …and risk aware culture **Knowledge/Skills/Competencies** + Must have strong knowledge of Access Management , DLP solution, SIEM technology and Auditing and Log ... solutions and integrating them into the corporate security framework. + Project Management : A good understanding of project management and developing technical… more
- Google (Seattle, WA)
- …years of experience building software for data privacy or security (eg, identity and access management ). + 2 years of experience with data privacy, security ... related technical field. + Experience with security assessments, vulnerability management , security research, vulnerability investigation or security development life-cycle.… more
- ProMedica Health System (Toledo, OH)
- …involving technology. + Implement, manage, and maintain a robust identity and access management solution that effectively and efficiently provisions and ... commitment to effectively lead project and operating teams. Works with senior management to ensure appropriate mitigation strategies and solutions are in place.… more
- Edward Jones (St. Louis, MO)
- …security domains including network security, endpoint protection, identity and access management , servers and containerization, applications, and cloud ... 27001). + Strong knowledge of security tooling such as SIEM, vulnerability management , configuration management , and cloud-native security services. + Proven… more
- TE Connectivity (PA)
- …Trend Micro, or equivalent endpoint security platforms. * Familiarity with Privileged Access Management (PAM) tools, including Microsoft LAPS. * Advanced ... Windows and Linux systems administration, antivirus and endpoint protection management , digital certificate administration, and automation via scripting. The… more
Recent Jobs
-
AI Infrastructure Technical Program Manager - Operations Coordination
- Oracle (Columbia, SC)
-
Claims Investigator - Experienced
- Command Investigations (Chattanooga, TN)